Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Security Office

Expired Job

Northwell Health Manhasset , NY 11030

Posted 4 months ago

Job Description:

Protects and safeguards hospital property, personnel, patients and visitors. Maintains order, detects crime and works to prevent future occurrences; operates hospital vehicles; enforces Hospital Security policies.

Responsibilities Include:

  • Patrols and monitors buildings and grounds to protect life and property and to prevent fire, thefts, vandalism, illegal entry and enforce hospital policies.

  • Enforces access control policy. Secures doors, locks, etc. and activates or de-activates alarms, as required.

  • Controls and regulates pedestrian and vehicular traffic in a safe, orderly and respectful manner.

  • Operates and maintains facility vehicles in accordance with regulatory compliance and policies.

  • Operates and maintains all security and facility equipment in accordance with manufacturers' guidelines and facility policies.

  • Writes incident report in accordance with policies and procedures to document events.

  • Checks contents of packages.

  • Restrains patients and unruly persons, on the hospital grounds and in buildings; assists security personnel in the performance of their duties, through the use of physical force, when required.

  • Reports all fire hazards and safety violations. Escorts Hospital personnel, as required.

  • Performs related duties, as required.

Qualifications

  • High School Diploma or equivalent, required.

  • Valid NYS Security Guard License, required.

  • Valid NYS Drivers License

  • OR

Valid NYS CDL Permit (Class B-with Passenger Certification valid for air brakes) within six (6) months of employment, required based on operational needs of a specific Business Unit.

  • Basic Life Support (BLS) or equivalent certification within orientation period, required.

  • Minimum of one (1) year experience as a Security Officer, preferred.

See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Sr Security Operations Analyst

Atrilogy

Posted Yesterday

VIEW JOBS 11/14/2018 12:00:00 AM 2019-02-12T00:00 The Sr. Security Operations Analyst is responsible for vulnerability management, security monitoring and incident response for internal and external threats. The Sr. Security Operations Analyst performs advanced threat and vulnerability analysis, collaborates with internal IT teams and MSSP for security monitoring response, improves correlation and monitoring of security events, and leads security monitoring projects.<br /> <br /> <u><strong>Key Responsibilities</strong></u><br /> <br /> <strong>Security Monitoring</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Responsible for Security Operations expansion into Brazil to handle threat detection and response along with new security technology deployments.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Conducts investigations and responds to internal and external security threats.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Oversees, responds to, and remediates DLP (data loss prevention) and SIEM events from on premise and cloud systems.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Implements advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Manages, administrates, and improves security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS and other industry standard security technologies.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develops automation response scripts to remediate commodity threats.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Performs threat hunting activities to identify compromised resources.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Understands and performs threat analysis utilizing industry standard frameworks (kill chain and diamond model).</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Performs threat research and intelligence gathering to improve detection and response capabilities.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Proposes and helps review security plans and policies to improve the security environment.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Maintains operational playbooks, process diagrams and documentation for security monitoring and response.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Reviews proposed Security deployments to ensure security monitoring requirements are met.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Other duties may be assigned as needed to address new security threats facing the enterprise environment.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provides off hour support as needed for security monitoring and response activities.</li> </ul>  <br /> <strong>Incident Response</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Works closely with MSSP services, external forensic providers, and in house IT teams to respond to and remediate security incidents both internal and external.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Reviews compromised systems to identify root cause of security incidents and remediation actions that need to be taken.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Researches new TTPs (tactics, techniques, and procedures) that threat actors are utilizing to undermine enterprise IT environments.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Correlate incident data to identify specific vulnerabilities and make recommendations that enable swift remediation.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Plans, implements, and documents incident handling and response tasks and procedures.</li> </ul>  <br /> <strong>Emerging Threats Monitoring</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Obtains information and stays up-to-date on the latest threats and security trends in a fast and efficient way to keep the enterprise environment protected.</li> </ul> <br /> <strong>Service Desk and Incident Management</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Assists in the investigation and resolution of security issues.</li> </ul> <br /> <strong>Vulnerability Management</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Perform application and infrastructure vulnerability scanning</li> </ul> <br /> <strong>Security Monitoring</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Work with internal IT teams and external MSSPs for security monitoring of IDS, SIEM, DLP, AV, and Endpoint Security technologies.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Performs security event correlation, triage, and analysis.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Applies Security Threat Intelligence to respond appropriately to security events.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Recognize when a network/system has been compromised from and internal or external threat actor.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Works on projects to improve security monitoring and response capabilities.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong understanding of defense-in-depth security best practices.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Demonstrate effective communication of security issues to management and others.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Maintain the security monitoring operational guidelines and standards for security.</li> </ul>  <br /> Incident Response<br /> ·    Performs incident response and forensic activities for internal and external threats.<br /> ·    Works with internal IT teams, MSSPs, and external forensic services to respond to incidents.<br /> ·    Ensure that all identified breaches in security are promptly and thoroughly investigated/remediated.<br /> ·    Ensure that security incidents are documented accurately and complete.<br />  <br /> <strong>Vulnerability Management</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Perform infrastructure vulnerability scanning using enterprise grade tools such as Qualys, Nessus, Nexpose, etc.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Perform manual and automated application vulnerability scans</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Explain to developers and engineers how to remediate discovered issues</li> </ul> <br /> <strong>Skills & Qualifications:</strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Bachelor’s degree in Computer Science degree or related field or equivalent combination of industry related professional experience and education</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Working experience with Information Security, Network Security, Security Monitoring, Incident Response, and Vulnerability Management</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Working experience with industry standard security technologies and services Firewalls, VPN, IDS, Endpoint Security, DLP, AV, Proxy, SIEM</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Strong experience with SIEM event/log analysis and correlation</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s)</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Network / System Administration experience / background</li> </ul> Atrilogy North Hills NY

Security Office

Expired Job

Northwell Health