Info Systems Security - Sr. -experience with security incident response required
Interested in a career with both meaning and growth? Whether your abilities are in direct patient care or one of the many other areas of healthcare administration and support, everyone at Parkland works together to fulfill our mission: the health and well-being of individuals and communities entrusted to our care. By joining Parkland, you become part of a diverse healthcare legacy that’s served our community for more than 125 years. Put your skills to work with us, seek opportunities to learn and join a talented team where patient care is more than a job. It’s our passion.
Primary Purpose The primary responsibility of this position is to ensure the confidentiality, availability and integrity of Parkland's data, computer systems and network devices by recommending, implementing and utilizing security defense systems to reduce the opportunity of cyber attacks.
Minimum Specifications
Education Must have a Bachelors degree in Management Information Systems.
Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain.
Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements.
Certification/Registration/Licensure Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position. CISSP Preferred.
Required Tests for Placement Skills or Special Abilities Knowledge of NIST, HITRUST, PCI, HIPAA Security Rule and associated common security frameworks Professional experience in a system administration role supporting multiple platforms and applications Must have the ability to perform complex research in order to determine industry standard products and solutions in response to security requirements Must have the ability to develop project plans, organize and monitor tasks, and be able to produce quality results in a timely manner. Must be able to perform technical risk assessments and implement corrective actions regarding the safeguarding of information systems. Must be able to independently implement and maintain complex information security tools and provide guidance to other technical staff on proper use of the tools. Must have superior writing skills and the ability to communicate effectively. Working knowledge of design, implementation, and maintenance of: Local area networks, Microsoft Active Directory / GPO, Data Loss Prevention, Encryption Technologies, Intrusion Detection Systems, Intrusion Prevention Virtual Private Network, Linux Operating Systems, Windows Operating Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management. Must be able to listen and communicate effectively with executive level staff and leadership teams. Direct experience with anti-virus software, intrusion detection, firewalls and content filtering Experience with hacker techniques and network security principles.
Responsibilities 1. Research and investigate the potential impact of new threats and exploits. Conducts log analysis and other network forensic investigations. 2. Identify, design and execute security projects that improve detection and response capabilities. 3. Collect threat intelligence and automate systems to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and operational support requirements are being met. 7. Manages on-time delivery of assigned tasks against existing plans and schedules. 8. Design, implement and support Information Security tools and infrastructure systems maintained by the Parkland Information Security Organization. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls. 9. Maintains knowledge of applicable rules, regulations, policies, laws and guidelines that impact Parkland. Participates in the creation of effective security controls designed to promote adherence with applicable laws and accreditation agency requirements. Seeks advice and guidance as needed to ensure proper understanding. 10. Stays abreast of new developments in the field of technology and security by attending seminars/workshops, reading professional journals, and actively participating in professional organizations. Integrates knowledge gained into current work practices.
#LI-SS2
Parkland Health and Hospital System prohibits discrimination based on age (40 or over), race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, genetic information, disability, national origin, marital status, political belief, or veteran status. As part of our commitment to our patients and employees’ wellness, Parkland Health is a tobacco and smoke-free campus.
Recommended Jobs
Sourcing Commodity Manager - Interconnects
The application window is expected to close on: 9/10/2025 Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. Meet the Team …
Groomer
Job Description Job Description Description: Are you ready to join our team and make tails wag? Are you an animal lover with a knack for making pets look and feel their best? At Lucy's Doggy Day…
Accounts Payable
Description # Verify / reconcile invoices to receiving and purchase documents. # Review purchase orders / requisitions for satisfactory approvals. # Clarify any questionable …
Salesforce Tech lead/Architect- C2H GC/USC only
Job Description Job Description This is a C2H role and can convert to employee in 6 months- Must have GC/USC 12+ years Salesforce experience, with at least 6 years in an architect/lead capacity…
CT Tech
Overview Join our team as a variable shift , PRN , CT Technologist , in Amarillo, TX Why Join Us? Thrive in a People-First Environment and Make Healthcare Better Thrive: We em…
BRYAN-Production Line Worker
Job Description Job Description Job description Production Worker Job Description We are looking for Production Line Worker to assist in the manufacturing process at our facility. You will …
Internet Radio Broadcasting Manager
Job Title: Internet Radio Broadcasting Manager Job Summary: We are seeking an experienced Internet Radio Broadcasting Manager to oversee the daily operations of our online radio station. The suc…
Hospital | CT Tech
Locum Tenens CT Technologist Job – Hospital Travel Assignment in San Angelo, Texas Advance your radiology career with a high-demand Locum Tenens CT Technologist position in San Angelo, TX (zip code…
Cybersecurity, Privacy and Forensics - Data Protection - Varonis Implementation Senior Associate Save for Later Remove job
At PwC, our people in legal services offer comprehensive legal solutions and advice to internal stakeholders and clients, maintaining compliance with regulations and minimising legal risks. These i…
Locksmith Retail Associate
Join our team as a Locksmith Retail Associate, where you will play a crucial role in providing excellent customer service and locksmith services. We are a company that values strong communication ski…