|
SHIFT: Day (United States of America)
Seeking Breakthrough Makers
Children's Hospital of Philadelphia (CHOP) offers countless ways to change lives. Our diverse community of more than 20,000 Breakthrough Makers will inspire you to pursue passions, develop expertise, and drive innovation.
At CHOP, your experience is valued; your voice is heard; and your contributions make a difference for patients and families. Join us as we build on our promise to advance pediatric care-and your career.
CHOP does not discriminate on the basis of race, color, sex, national origin, religion, or any other legally protected categories in any employment, training, or vendor decisions or programs. CHOP recognizes the critical importance of a workforce rich in varied backgrounds and experiences and engages in ongoing efforts to achieve that through equally varied and non-discriminatory means. Summary This role requires a proven leader in enterprise vulnerability program management who can design, operate, and continuously mature a comprehensive vulnerability lifecycle across clinical, corporate, and cloud environments. The ideal candidate brings hands-on expertise with Rapid7, InsightVM, and ServiceNow Vulnerability Response to drive risk-based prioritization, automated workflows, and executive-level reporting. You will partner closely with IT, cloud, and application teams to translate scan results into actionable remediation plans, enforce SLAs, and align vulnerability management practices with NIST, HIPAA, and organizational risk frameworks-ensuring measurable risk reduction and sustained compliance across the enterprise. This department works approximately 80% remotely, 20% on site in our Philadelphia offices on an as-needed basis.
A Brief Overview
- Demonstrates specialized & comprehensive knowledge in Information security management practices, disciplines, regulations, industry standards, related frameworks, project management principles, and methodologies, security engineering concepts, security operations model; industry standards around architecture principles.
- Demonstrates exceptional skills in managing multiple projects and priorities in order to meet strategic goals and timelines.
- Exhibits the ability to plan, manage and implement highly complex enterprise architecture and security implementations, enhancements or modifications that require in-depth knowledge across multiple technical areas and business segments.
- Exhibits exceptional understanding of emerging regulatory and healthcare issues in order to develop internal and external checks and controls to ensure proper governance, security and quality of information assets.
- Demonstrates exceptional troubleshooting and collaborative skills required to identify, analyze and resolve complicated security issues.
- Demonstrates advanced proficiency in creating detailed documentation, perform budget planning and oversight, and providing input on CHOP infrastructure strategic planning, technology standards, and information security and risk practices.
- Exhibits ability to communicate effectively with clients, colleagues, vendors, management and the ability to translate complex technical solutions into non-technical requirements documents.
- Performs planning, development, implementation, and delivery of enterprise architecture and engineering principles for new, existing and future strategic and operational activities.
- Demonstrates the ability to provide technical expertise and consultation to the CIO, CTO, CISO, executive leadership and other business and clinical leaders.
What you will do
- A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
- Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
- Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
- Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
- Functions as the Subject Matter Expert (SME) to maintain an understanding of CHOP DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
- Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
- Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
- Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Education Qualifications
- Bachelor's Degree - Required
- Bachelor's Degree Computer Science, Information Systems, or related field - Preferred
Experience Qualifications
- At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment. Required and
- At least six (6) years experience with information security, regulatory compliance and risk management concepts. Required and
- At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training. Required and
- Experience with Cloud and/or Virtualization technologies. Required
- At least three (3) years in working with matrixed high performance teams. Preferred
Skills and Abilities
- Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
- Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
- Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
- Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
- Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
- Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
- General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
- Microsoft, UNIX, Lawson, and Clinical Applications,
- Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
- Experience with risk management frameworks.
- Information Security Requirements
- Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
- Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store CHOP information.
- Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Licenses and Certifications
- Certified Information Systems Security Professional (CISSP) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- HealthCare Information Security and Privacy Practitioner (HCISPP) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Certified in Cybersecurity - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Systems Security Certified Practitioner (SSCP) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Certified Information Security Manager (CISM) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Certified Information Systems Auditor (CISA) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Certified in the Governance of Enterprise IT (CGEIT) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- Certified in Risk and Information Systems Control (CRISC) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or
- CompTIA Security+ - CompTIA - upon hire - Preferred or
- GIAC Security Essentials (GSEC) - GIAC Certifications - upon hire - Preferred or
- Certified Ethical Hacker (CEH) - EC-Council - upon hire - Preferred or
- Certificate of Cloud Security Knowledge (CCSK) - Cloud Security Alliance (CSA) - upon hire - Preferred or
- Certificate of Cloud Auditing Knowledge (CCAK) - Cloud Security Alliance (CSA) - upon hire - Preferred
To carry out its mission, CHOP is committed to supporting the health of our patients, families, workforce, and global community. As a condition of employment, CHOP employees who work in patient care buildings or who have patient facing responsibilities must receive an annual influenza vaccine. Learn more.
EEO / VEVRAA Federal Contractor | Tobacco Statement SALARY RANGE:
$126,560.00 - $167,690.00 Annually
Salary ranges are shown for full-time jobs. If you're working part-time, your pay will be adjusted accordingly. ------------------- At CHOP, we are committed to fair and transparent pay practices. Factors such as skills and experience could result in an offer above the salary range noted in this job posting. Click here for more information regarding CHOP's Compensation and Benefits.
|