This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Check out new job offers everyday

To post a job, login or create an account |  Post a Job

Information Security Analyst


This is a Full-time position in Vancouver, WA posted April 5, 2021.

Descriptionn n Job ID: 48206n n Information Security Analyst Responsibilitiesn n Responsible for supporting the design, planning, facilitation, evaluation and implementation of information security-related policies, procedures, standards, controls and technologies across company.nContributes to the goals, strategy, methodologies and outcomes of the Information Security Program and related technologies.nProvides input, expertise and technical assistance in collaboration with peers, junior team members and caregivers from adjacent departments, such as Information Technology (IT), Compliance, Legal, Privacy, Communications and Operations.nResponsible for the successful delivery and tracking of outcomes related to 1-2 significant initiatives and contributes to multiple smaller efforts concurrently.nResponsible for the day-to-day operations of at least one information security-related technology system.nPrepares and presents detailed and high-level reports to internal and external stakeholders at multiple levels (up to Manager).nProvides on-call after-hours support as assigned.n n Essential Functionsn n Supports the design, engineering, implementation and operation of information security processes, policies, procedures, standards, systems and controls based on business and technical requirements.nAnalyzes data from information security technology sources, such as endpoint protection, intrusion detection, security event monitors and secure proxies, to identify potential threats and defend company against threats.nProtects information and information systems by analyzing public and private information sources to develop effective defensive techniques, policies, procedures and standards.nCollaborates with information security, technology teams and business stakeholders to respond to and remediate identified vulnerabilities and gaps in security controls, policies, procedures and standards.nSupports the design and implementation of security response automation, integrating various information and information security tools to create fast, intelligent responses to common and/or critical cyber incidents.nEffectively communicates technical issues and investigative findings to technical and non-technical audiences in written and verbal form.nSupports information sharing and integration procedures across information security through the exchange of threat intelligence and cyber security vulnerability assessment data.nSupports information security assessment activities in collaboration with technical and non-technical teams across the organization.nProvides recommendations related to information security gaps and vulnerabilities in collaboration with stakeholders across the organization.nServes as an advisor and subject matter expert on identified information security issues, projects, or any other initiative that may have an information security implication.nFacilitates information security work groups, including project management, scheduling, coordination, follow up, status reports and report outs.nSupports and responds to security-related investigations and other information security requests across company.nContributes to information security intellectual capital by making process or procedure improvements and enhancing team documentation.nPromotes and implements information security education and awareness policies, procedures, standards and controls in collaboration with stakeholders across the organization.nContributes to the analysis, design, build and management of role-based access controls for users of applications and systems.nCoordinates and supports user access review processes.nGenerates reports and metrics (e.g., system/control metrics, status updates, risk assessment reports, remediation reports) to support information security measurement and reporting objectives.nProvides support and assistance to caregivers across the organization related to information security related technology and programs.nProvides on-call after-hours support on a rotational basis as assigned, including evenings, weekends, and holidays.nPerforms other duties as assigned.n n Information Security Analyst Qualificationsn n Bachelor’s Degree in Computer Science, Healthcare Information Technology, or relevant field or equivalent knowledge and skills obtained through a combination of education, training and experience required.nMinimum of five (5) years of experience in IT, information security, cyber risk management, compliance or a related field required; of which at least 3 years’ experience in information security is required.n n Healthcare Experience Preferred.n n One or more relevant information security-related certifications required.

Examples include: CISSP, CISA, HCISPP, CCSP, CRISC, CISM, CGIH, GCFA, GNFA, GPEN, GSEC, CEH, and Epic Security Coordinator.nAbility to work independently and manage day-to-day assignments with limited supervision and guidance.nExcellent written and oral communications skills.nAbility to present information in various forms such as textual, graphical and statistical.nAbility to collect and analyze data to guide decision making while under potentially intense pressure to address security incidents.nAbility to work collaboratively with a broad range of constituencies and respond to their needs and collaborate effectively towards solutions.nAbility to work on matters of high sensitivity and confidentiality with both professionalism and discretion.nHands-on experience implementing and operating one or more common information security tools, such as endpoint protection, intrusion detection, security event monitors, secure proxies, firewalls, encryption, single sign-on, multi-factor authentication, etc.nHands-on experience implementing and operating one or more common information security methodologies, such as incident response, risk management, data protection, identity and access management, role-based access control, etc.nKnowledge of cyber threats and vulnerabilities.nKnowledge of adversarial tactics and techniques.nKnowledge of cybersecurity, ethics and privacy principles, along with related regulatory requirements and industry frameworks (e.g., NIST CSF).nKnowledge of government and other regulatory requirements for medical billing and benefit verification as they pertain to access and user management.nKnowledge of Microsoft Azure cloud and security services.n nThis is a remote position.n n About VanderHouwenn n VanderHouwen is an award-winning, Women-Owned, WBENC certified professional staffing firm.

Founded in 1987, VanderHouwen has been successfully placing experienced professionals throughout the Pacific Northwest and nationwide.

Our recruitment teams are highly specialized in either Technology and IT, Engineering, or Accounting and Finance career markets.

Our recruiters value building meaningful, professional relationships with each candidate as well as developing honed knowledge of companies’ staffing needs and workplaces.

Partner with us to land your next exciting career.n nVanderHouwen is an Equal Opportunity Employer and participates in E-Verify.

VanderHouwen does not discriminate on the basis of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by applicable local, state or federal civil rights laws.n n