GRC Security Architect, FCH - IT - Security

Froedtert Memorial Lutheran Hospital Menomonee Falls , WI 53051

Posted 3 months ago

Come join our award winning team! See What Is Possible.

The Froedtert & the Medical College of Wisconsin regional health care network is composed of an academic medical center, two community hospitals and more than 25 primary and specialty care health centers and clinics. The Froedtert & MCW health network offers exceptional care in the community and streamlined, coordinated access to specialty expertise, clinical trials and the full range of tertiary care capabilities of eastern Wisconsins only academic medical center when the need for more complex treatment arises.

Froedtert Health has been widely recognized for our dedication to our staff, providing a work environment full of encouragement, innovation, collaboration and respect.

We invite you to review the job posting below. If you meet the requirements and qualifications for this opportunity, you are encouraged to apply.

Thank you for considering a career with Froedtert Health!

Location: US:WI:MENOMONEE FALLS at our WOODLAND PRIME 400 facility.

FTE: 1.000000

  • 1.0 FTE is Full-Time, any position less than 1.0 FTE is Part-Time, and .001 FTE is Optional Part-Time*
  • Positions with an "FTE" (full time equivalency) of .875 - 1.0 are eligible for full-time medical, dental and vision benefits. Positions with an "FTE" of .5 - .874 are eligible for part-time pro-rated medical, dental and vision benefits*

Shift: 1st shift

Responsibilities:

As a senior member of Information Security team this enterprise-wide role is integral in defining and assessing the organization's security strategy, architecture and practices. The enterprise security architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services, evaluate and incorporate emerging technologies and evaluate changes to the threat landscapes. Interacts with senior leaders across the enterprise and acts as a trusted senior advisor.

Develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.

Develop security strategy plans and roadmaps based on sound enterprise architecture practices.

Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.

Track developments and changes in the digital business and threat environments to ensure that they're adequately addressed in security strategy plans and architecture artifacts

Participate in application and infrastructure projects to provide security-planning advice

Draft security procedures and standards to be reviewed and approved by executive management and/or formally authorized by the CISO

Determine baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM)

Develop standards and practices for data encryption and tokenization in the organization, based on the organization's data classification criteria

Conduct or facilitate threat modeling of services and applications that tie to the risk and data associated with the service or application

Ensure a complete, accurate and valid inventory of all systems, infrastructure and applications that should be logged by the security information and event management (SIEM) or log management tool

Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, as well as counterparts within the network operations center (NOC)

Coordinate with the compliance office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization)

Validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable

Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems

Review network segmentation to ensure least privilege for network access

Liaise with the vendor management (VM) team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data:

Software as a service (SaaS) providers

Cloud/infrastructure as a service (IaaS) providers

Managed service providers (MSPs)

Evaluate the statements of work (SOWs) for these providers to ensure that adequate security protections are in place. Assess the providers' SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required "user controls" and report any findings to the CISO and vendor management teams

Liaise with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls

Support the testing and validation of internal security controls, as directed by the CISO or the internal audit team

Review security technologies, tools and services, and make recommendations to the broader security team for their use, based on security, financial and operational metrics

Coordinate with operational and facility management teams to assess the security of operational technology (OT) and Medical Devices and systems

Liaise with other security architects and security practitioners to share best practices and insights

Liaise with the business continuity management (BCM) team to validate security practices for BCM testing and operations when a failover occurs

Summary:

A minimum of 10 years of experience in a related field.

Bachelors degree in Computer Science is required or equivalent acquired through combination of education and experience.

Other information:

Strong oral and presentation skills.

In-depth knowledge of cybersecurity frameworks including but not limited to NIST CF, HITRUST CSF, ISO 27001.

Strong knowledge of laws and regulations including but not limited to PCI-DSS, HIPAA-HITECH.

Experience in using architecture methodologies such as SABSA, Zachman, or TOGAF.

Direct, hands-on experience or strong working knowledge of managing security infrastructure e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology.

Strong working knowledge of vulnerability management practices and tools.

Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.

Direct experience designing IAM technologies and services such as AD, LDAP, and/or AWS IAM.

Strong working knowledge of IT service management ITIL related services Change management, Configuration management, Asset management, Incident management, Problem management, etc.

Experience designing and securing applications and infrastructures in cloud environments such as AWS and/or Azure.

We are proud to be an Equal Opportunity Employer who values and maintains an environment that attracts, recruits, engages and retains a diverse workforce. As a federal contractor/subcontractor, we take affirmative action in employment based on race, sex, disability and status as a protected veteran.

We welcome protected veterans to share their priority consideration status with us at 262-439-1961. We maintain a drug-free workplace and perform pre-employment substance abuse testing



icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
IT Security Administrator IAM FCH IT Security

Froedtert Memorial Lutheran Hospital

Posted 6 days ago

VIEW JOBS 10/8/2019 12:00:00 AM 2020-01-06T00:00 Come join our award winning team! See What Is Possible�. The Froedtert & the Medical College of Wisconsin regional health care network is composed of an academic medical center, two community hospitals and more than 25 primary and specialty care health centers and clinics. The Froedtert & MCW health network offers exceptional care in the community and streamlined, coordinated access to specialty expertise, clinical trials and the full range of tertiary care capabilities of eastern Wisconsin�s only academic medical center when the need for more complex treatment arises. Froedtert Health has been widely recognized for our dedication to our staff, providing a work environment full of encouragement, innovation, collaboration and respect. Our best-in-class wellness program has earned us recognition in the Milwaukee Business Journal as a Healthiest Employer and a Gold Well Workplace award from the Wellness Council of America. We invite you to review the job posting below. If you meet the requirements and qualifications for this opportunity, you are encouraged to apply. Thank you for considering a career with Froedtert Health! Location: US:WI:MENOMONEE FALLS at our WOODLAND PRIME 400 facility. FTE: 1.000000 * 1.0 FTE is Full-Time, any position less than 1.0 FTE is Part-Time, and .001 FTE is Optional Part-Time* * Positions with an "FTE" (full time equivalency) of .875 - 1.0 are eligible for full-time medical, dental and vision benefits. Positions with an "FTE" of .5 - .874 are eligible for part-time pro-rated medical, dental and vision benefits* Shift: 1st shift Monday - Friday 8 am - 4:30 pm. Rotating on-call schedule (after orientation). Occasional longer hours or weekends based on project go-lives. Responsibilities: Identity and access management (IAM) is the business processes that facilitate the management of electronic or digital identities. The framework includes the organizational policies for managing digital identity as well as the technologies needed to support identity management including all the necessary controls and tools to capture and record user login information, manage user identities and the assignment and removal of access privileges.. Summary: � 3-6 years� experience in a related field. � Knowledge of computer principles at a level normally acquired through completion of a Bachelor�s degree in a relevant technology field or acquired through a combination of education and experience is required. Other information: � Develop and maintain the Identity and Access Management systems and standards. � Perform daily quality checks that IAM systems are performing tasks correctly. � Create, modify, and troubleshoot security access to networks and applications. � Identify, log, and resolve Identity and Access Management tickets. Monitor the status of tickets and advise customers of status in a timely manner. � Participate in new information technology projects. � Maintain process documentation for Identity and Access Management activities. � Serve as an escalation resource for the Identity and Access Management team. Cross-train the team in order to backfill and backup peers as needed. � Develop departmental metrics; assist leadership to assure goals are being reached with in group � Follow ITSM Standards set forth by IT Leadership for incident management, change management, release management, problem management and request management. � Proficient at the on-call process and be able to quickly escalate if needed � Participate in audits, investigations, providing meaningful evidence We are proud to be an Equal Opportunity Employer who values and maintains an environment that attracts, recruits, engages and retains a diverse workforce. As a federal contractor/subcontractor, we take affirmative action in employment based on race, sex, disability and status as a protected veteran. We welcome protected veterans to share their priority consideration status with us at 262-439-1961. We maintain a drug-free workplace and perform pre-employment substance abuse testing Froedtert Memorial Lutheran Hospital Menomonee Falls WI

GRC Security Architect, FCH - IT - Security

Froedtert Memorial Lutheran Hospital