Grow your career at Cedars-Sinai!
The Enterprise Information Services (EIS) team at Cedars-Sinai understands that true clinical transformation and the optimization of a clinical information systems implementation is fueled through the alignment of the right people, processes, and technologies.
Why work here?
Cedars-Sinai Medical Center has been ranked the #1 hospital in California and #2 hospital in the nation by U.S. News & World Report, 2022???23. When you join our team, you???ll gain access to our groundbreaking biomedical research facilities and advanced medical education programs. We offer learning programs, tuition reimbursement and performance-improvement projects so you can achieve certifications and degrees while gaining the knowledge and experience needed to advance your career.
We take pride in hiring the best, most hard-working employees. Our dedicated doctors, nurses and staff reflect the culturally and ethnically diverse community we serve. They are proof of our dedication to creating a dynamic, inclusive environment that fuels innovation and the gold standard of patient care we strive for.
What will you be doing in this role:
The Cybersecurity Specialist is responsible for supporting, creating, and implementing of security architectures and secure application designs for information systems. This includes assisting application developers/support teams with secure application design, planning and integration. Conduct security architecture reviews, provides secure application/infrastructure solutions, designing/implementing mechanisms & programs that restrict access of malicious intent or other unauthorized users. Introducing new security methods/technologies for integration with existing technical architectures, frameworks, implementation planning, documentation of standard methodologies, and templates. Assessing security threats/risks and recommend/assist in the delivery of solutions to mitigate risks.
Participating in the creation and administration of data security policies, procedures, and standards.
Participating in access audits and conducting computing forensics.
Participate in the creation and maintenance of data and network security policies and procedures.
Provide system assurance and security oversight in EIS change control process; review and evaluate risks of submitted changes and impact to the security of CSMC network and systems.
Review logs from intrusion detection and monitoring systems; conduct correlation analysis and take action accordingly.
Facilitate external third party assurance reviews to assess networks (internal, external, wireless, etc.).
Work with technical teams to facilitate & promote security incident response procedures, address monitoring concerns, and identification of criteria for audit reporting.
Conduct on-demand forensics analysis and review of compromised systems and/or systems used in potential un-secure and un-trusted manner.
Conduct periodic review and scanning of: DMZ assets, critical servers, internal/external, and wireless networks.
Develop security metrics and reporting on security monitoring efforts.
Use security monitoring tools to evaluate and improve the security of organization systems and network.
Maintain and support the security tools suite to ensure logged data fidelity and integrity.