It’s with great pride and excitement that we present our new brand.

A common name for a common purpose.

As we transition to ECU Health in the coming weeks and months, you will notice changes to our digital landscape, including ongoing updates to this site. Throughout this rebranding and into the future we remain committed to the communities we proudly serve. We’re excited for this evolution, and what it means for the future of health care in eastern North Carolina.

GO TO SITE
Join our Talent Network
Skip to main content

Cyber Security Architect III

Job ID: 963774
Facility: ECU Health
Dept: Information Security Services
Location: Greenville, NC
FT/PT: Full-Time
Shift: Not Applicable
Reg/Temp: Regular
Date Posted: Jun 7, 2023

Save Job Job Saved

Job Description

ECU Health

About ECU Health

ECU Health is a mission-driven, 1,708-bed academic health care system serving more than 1.4 million people in 29 eastern North Carolina counties. The not-for-profit system is comprised of 13,000 team members, nine hospitals and a physician group that encompasses over 1,100 academic and community providers practicing in over 180 primary and specialty clinics located in more than 130 locations.

The flagship ECU Health Medical Center, a Level I Trauma Center, and ECU Health Maynard Children’s Hospital serve as the primary teaching hospitals for the Brody School of Medicine at East Carolina University. ECU Health and the Brody School of Medicine share a combined academic mission to improve the health and well-being of eastern North Carolina through patient care, education and research.

Position Summary

Analyzes, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations. Uses cybersecurity tools to proactively search for threats to systems or networks. Conducts network defense analysis and provides recommendations for improvements. Develops and maintains thorough, up-to-date knowledge of cybersecurity threats and incident response best practices.

Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Utilizes a variety of security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in designs.

Works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge.

Identifies and tests potential information and network or internet security vulnerabilities.

Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks. Supports and maintains security defense architecture.

Responsibilities

Ability to learn new skills quickly; Keen attention to detail; and Adept at multi-tasking such as concurrently managing multiple incidents, project tasks, or keep lights on maintenance activities.

Implements preventive measures for similar issues. Partners with other teams to develop complex unit and integrated test plans.

Proactively evaluates needs for required system upgrades or patches to ensure compliant with technology versioning for technology supported directly or indirectly by team.

Coordinates and performs cross functional team evaluation, testing, and implementation of defect patches, system upgrades and releases according to the Information Services support model and change control procedures.

Implement and provide ongoing monitoring and enhancing of testing automation tools to reduce labor effort to perform unit or integrated testing time.

Performs an extensive range and variety of complex technical, financial, quality, and/or professional work activities.

Undertakes work which requires the application of principles in a wide and often unpredictable range of contexts.

Possesses clear understanding of technology interdependency from a business or clinical operations and IT system perspective on complex or enterprise level.

Initiates and assists in coordinating the technical aspects on your team.

Analyze data and present information in a way this is understandable and supports decision making.

Proactively ensures security is appropriately addressed within their area by self and others. Engages or works with security specialists as necessary. Contributes to the security culture of the organization.

Understand how services provided by your area share data between systems, internal and external to the organization.

Develop diagrams that represent how the system communicates or interfaces with other systems. Advanced documentation may also include security entitlements, architecture, or logical environments.
Effectively guides work of other team members.

Follows methodology and procedures set by IS Project Management Office (PMO) and completes assigned tasks related to projects.

Proposes ideas, solutions and action plans.

Ability to coach and mentor to grow.

Provides subject matter expertise to help improve team performance and drive results. Leads by example and demonstrates flexibility to adapt to different situations.
Communications effectively to others strategy alignment and big picture.

Leads team members and engaging business partners in learning opportunities within department, vendor user groups, or industry forums.

Sought out by organization team members for subject matter expertise.
Accepts responsibility for own actions and decisions. Does not make excuses for errors. Acknowledges and corrects own mistakes, following the Just Culture Model. Understands the risks and consequences that errors in work could have on patient care and/or organizational finances.

Deep knowledge of ITIL including Service Value System and demonstrates ability to mentor others on ITIL guiding principles.

Monitors and supports team based metrics for service management and leads team in discussing real-time interventions to mitigate missing targets and make recommends on implementing plans to avoid future incidents.
Aware of how processes and systems affect the organization, what is or is not working as they perform work and deliver services.

Constantly analyzing data and metrics and associated end user interactions in problem definition, and is willing to challenge long-held beliefs. Uses subject matter expertise to propose multiple alternatives and recommend and implement optimal solution. Makes effective decisions for self and team within scope of authority. Coaches other team members on problem solving techniques.
Interacts with team members and customers in a courteous, respectful and reciprocal manner.

Fosters coaching, feedback and listening skills as strategic tools for individual and team growth and development.

Handles difficult interpersonal situations with the intent of making positive contributions that result in desired outcomes and resolve issues. Honest and caring feedback is provided, oriented toward problem solving and removing obstacles.
Presents highly complex technical information to various audiences effectively including department, cross team, or larger group settings. Strives for Win-Win solutions with every interaction. Promotes transparency and awareness through communication with appropriate detail matching audience. Understands how and when to raise awareness to team and leadership with the needed effective content.
Respects team processes and holds self personally accountable.

Leads efforts to build collaboration across multiple teams, vendors, and business partners, recognizing and valuing varying expertise and input for complex workflows and enterprise level decisions.

Encourages open dialog and different points of view to elicit sound solution.

Influences strategy formation. Initiates influential relationships with vendors, peers and business partners in senior level positions.

Acknowledges and celebrates the achievements of team and team members.

Minimum Requirements

Bachelor's degree (or higher) or equivalent work training and experience required

Major advanced cyber security certification such as: CISSP, CISM, CISA, GIAC, CASP, CBCP, OSCP, OSCE is required or must be obtained within one year of hire.

5 - 7 years' experience in a LAN / WAN environment

7 or more years technical experience in cyber security

3-5 years' experience with forensic tools, investigations, and incident response.

Advanced knowledge of one or more of the following areas including 5 or more years of experience: Perimeter Access Defense, LAN / WAN routing and switching, IDS and firewall engineering. Provides team leadership in areas of expertise

Experience leading project teams to design and implement new solutions in areas of expertise

Experience working in team-oriented, collaborative environment

Independently motivated to seek knowledge in areas pertaining to their current position

Self-educates and seeks knowledge from management of ECU Health, Information Services environment and ECU Health operations relevant to their position

Must be able to read a packet capture

General Statement

It is the goal of ECU Health and its entities to employ the most qualified individual who best matches the requirements for the vacant position.

Offers of employment are subject to successful completion of all pre-employment screenings, which may include an occupational health screening, criminal record check, education, reference, and licensure verification.

We value diversity and are proud to be an equal opportunity employer. Decisions of employment are made based on business needs, job requirements and applicant’s qualifications without regard to race, color, religion, gender, national origin, disability status, protected veteran status, genetic information and testing, family and medical leave, sexual orientation, gender identity or expression or any other status protected by law. We prohibit retaliation against individuals who bring forth any complaint, orally or in writing, to the employer, or against any individuals who assist or participate in the investigation of any complaint.

Contact Information

For additional information, please contact:

D'metrius Dew, Talent Acquisition Consultant

ECU Health Talent Acquisition

Email: [email protected]

 

    

 

Share: mail

Similar Jobs

Medical Lab Scientist I

Greenville, NC, United States
Regular

Registered Nurse - Trauma Outreach Coordinator - Greenville

Greenville, NC, United States
Regular

Registered Nurse - SICU - Greenville

Greenville, NC, United States
Regular

Registered Nurse - 1 South Observation - Greenville

Greenville, NC, United States
Regular