- Maintain appropriate security measures and mechanisms to guard against unauthorized access to electronically stored and /or transmitted patient data and protect against reasonably anticipated threats and hazards.
- Evaluation and compliance with security measures.
- Disaster Recovery and Emergency operating procedures.
- Security Incident Response and process protocols including Incident Reporting and Sanctions.
- Testing of security procedures, mechanisms and measures.
- Assess information security risk periodically.
- Conduct functionality and gap analyses to determine the extent to which key business areas and infrastructure comply with statutory and regulatory requirements.
- Evaluate and recommend new information security technologies and counter-measures against threats to information or privacy.
- Ensure compliance through adequate training programs and periodic security audits. These audits should be both internal and external in nature.
- Strong domain expertise and technology implementation/ integration experience in three or more of the following areas :
i. Identity & Access Management
ii. Cloud Security
iii. End point Security
iv. Security Incident and Event Management
v. Data Protection
vi. Network Security
vii. Application Security
viii. Encryption and Key Management
- Design and optimize processes for detecting, reporting and remediating vulnerabilities within the network, computing infrastructure, and applications.
- Conduct automated scans and security audits on the infrastructure and applications to detect all known vulnerabilities, and ensure compliance with information security policies and procedures.
- Cooperate with infrastructure and application development teams in order to minimize the company's vulnerabilities and attack surface.
- Maintain a watchful posture on a multi-site environment in addition to roaming users for security events and incidents.
- Conduct effective and holistic monitoring across all infrastructure and application components ranging from the network, through operating systems, applications, and all defensive and detective systems.
- Correlate events across systems for maximum event detection.
Didn’t find the job appropriate? Report this Job