[Close] 

Information System Admin II

Company Name:
Novant Health
Information System Admin II
Job Description
Location: Fort Mill, SC
Job Summary:
The employee's number one job responsibility is to deliver the most remarkable patient experience, in every dimension, every time, and understand how he or she contributes to the health system's vision of achieving that commitment to patients and families.
Under general supervision, the Information System Admin II is responsible for providing technical expertise to assist in the development, planning, implementation, and monitoring of IT enterprise systems. Is lead for Information Systems Admin I. This role works closely with members of ITS and vendors to ensure that all appropriate security events are logged, monitored, and analyzed. Areas of responsibility include monitoring networks and systems and troubleshooting their anomalies to resolution. Operates as a member of the incident response team. Works to translate security event data into intelligence through event correlation, reporting, and trending, in order to provide visibility and insight into the computing environment.
The successful candidate must have a good understanding of information system and security standards, conventions, and new developments in the industry. Candidates should have a good blend of technical skills to ensure that he or she can meet the challenges of the job. Will act as an information system and security advisory advocate to both internal and external customers. Staffed by skilled employees who have had sufficient educational background and/or experience in information system and security, information system and security administration, or IT network/system administration.
Qualifications:
Education
: Bachelor's Degree required. Master's Degree preferred. Minimum of four year degree, military equivalence or a combination of education and hands on work experience equivalence required.
Experience
: Three or more years of proven information system and security experience. Three or more years of experience administrating windows workstations and servers. Three or more years of customer service experience required.
Licensure/Certification/Registration:
Operating System Certification and/or Security+ required. ITIL foundation preferred.
Additional skills required:
Able to develop productive working relationships with business and technical groups. Working knowledge of information management systems, data structures, data analysis, and report generation Functional Knowledge of HIPAA, ISO 27001/27002 framework, NIST 800-53, PCI-DSS, and COBIT. Able to effectively communicate with technical and non-technical audiences. Excellent written and verbal communication skills to be able to present to a target audience. High degree of professional poise, presence, and personal integrity. Demonstrated ability to effectively prioritize multiple responsibilities. Takes responsibility and demonstrates ownership of delegated projects, tasks, and issues. Strong attention to detail, communication skills, organization skills, and analytical abilities. Strong understanding of the different layers in the OSI model as well as how they interact. Strong working knowledge of security concepts and best practices for technologies including (but not limited to): Microsoft Windows, MS Active Directory, Linux/Unix, Firewalls, MS SQL, Routing, logging and monitoring, authentication systems, wireless, IDS/IPS, proxy technologies, remote access solutions (VPN, SSL, IPSEC) with two factor authentication, network, system and security monitoring, traffic analysis, data loss prevention, forensic and eDiscovery tools, etc. Technical knowledge of emerging system and security solutions. Familiarity with the concept of Defense in-depth a must. Intermediate to advanced kno

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.