This is a full-time positionwith Vanderbilt University Medical Center (VUMC) and includes a comprehensivebenefits packager, challenge and a highly collaborative team. We are in themidst of a major Epic implementation (internally named EpicLeap) and are poisedto fill this role in the near term.
For immediateconsideration, your skills and experience should include:
Oversee build andimplementation of Security files within all Epic environments and maintainpolicies and procedures for access to all Epic environments
Â· Creating all newusers in Epic including employees, contractors, students, and externalproviders
Â·Build and maintain allother EMP records including Templates and Background Users
Â·Coordinating with theTraining and Application teams to make sure the required training has beencompleted and the user has passed their proficiency exam before access ischanged or granted
Â· Working withApplication Teams when they need to determine the implications of a desiredchange (whether it will affect more than the intended user group)
Â· Build andmaintain Security Master Files
Â· Data CourierSecurity INIs from POC to other environments as requested by application groupsif appropriately approved and coordinated
Â· Consult withUsers & Security workgroup members to determine best and appropriate way toprovided needed access to users throughout the enterprise.
Â· Gatekeeper toinsure that Epic system access is limited to only those people who are approvedto have it
Â· Createdocumentation to share with other Users & Security Coordinator team membersfor ongoing support
Preferred Certification:Epic Security Coordinator (Updated NVT)
Key Functions and Expected Performances:
- Core Accountabilities:
- Organizational Impact: Executes job responsibilities with the understanding of how output would affect and impact other areas related to own job area/team with occasional guidance.
- Problem Solving/Complexity of Work: Analyzes moderately complex problems using technical experience and judgement
- Breadth of Knowledge: Has expanded knowledge gained through experience within a professional area
- Team Interaction: Provides informal guidance and support to team members
- Key Responsibilities:
- Conducts computer investigations.
- Responds and/or mitigates security breaches and attacks to the infrastructure.
- Conducts vulnerability and threat analysis for the environment.
- Core Capabilities: Supporting Colleagues
- Develops Self and Others: Invests time, energy and enthusiasm in developing self/others to help improve performance and gain knowledge in new areas
- Builds and Maintains Relationships: Maintains regular contact with key colleagues and stakeholders using formal and informal opportunities to expand and strengthen relationships
- Communicates Effectively: Recognizes group interactions and modifies one's own communication style to suit different situations and audiences
- Core Capabilities: Delivering Excellent Services
- Serves Others with Compassion: Seeks to understand current and future needs of relevant stakeholders and customizes services to better address them
- Solves Complex Problems: Approaches problems from different angles; Identifies new possibilities to interpret opportunities and develop concrete solutions
- Offers Meaningful Advice and Support: Provides ongoing support and coaching in a constructive manner to increase employees' effectiveness
- Core Capabilities: Ensuring High Quality
- Performs excellent work: Engages regularly in formal and informal dialogue about quality; directly addresses quality issues promptly
- Ensures continuous improvement: Applies various learning experiences by looking beyond symptoms to uncover underlying causes of problems and identifies ways to resolve them
- Fulfills safety and regulatory requirements: Understands all aspects of providing a safe environment and performs routine safety checks to prevent safety hazards from occurring
- Core Capabilities: Managing Resources Effectively
- Demonstrates Accountability: Demonstrates a sense of ownership, focusing on and driving critical issues to closure
- Stewards Organizational Resources: Applies understanding of the departmental work to effectively manage resources for a department/area
- Makes Data Driven Decisions: Demonstrates strong understanding of the information or data to identify and elevate opportunities
- Core Capabilities: Fostering Innovation
- Generates New Ideas: Proactively identifies new ideas/opportunities from multiple sources or methods to improve processes beyond conventional approaches
- Applies Technology: Demonstrates an enthusiasm for learning new technologies, tools, and procedures to address short-term challenges
- Adapts to Change: Views difficult situations and/or problems as opportunities for improvement; actively embraces change instead of emphasizing negative elements
- Technical Capabilities:
- Incident Response: Demonstrates the ability to respond quickly to reports from individuals. Takes immediate action to stop an incident from continuing or recurring. Determines whether an incident should be handled locally or reported to the IT Security Response Team. Works with the IT support staff to repair a system, restore service, and preserve evidence of the incident. Handles sensitive and other critical responses in a professional manner. Evaluates and documents investigation findings after resolving an incident.
- Vulnerability Assessments: Demonstrates the ability to successfully review basic Internet connections and internal networks to identify standard hacker/cracker threats. Able to review the configuration of server and major network applications to identify configuration errors and other problems that weaken organizational systems and increase their likelihood of misuse. Has conducted an assessment of at least one of the following:  access controls, governing access to applications and files,  password controls, determining permissible choice of passwords and governing the requirement to change passwords,  connectivity controls [e.g., open ports/ enabled protocols] influencing permissible communications to and from a computer system,  inappropriate files [including viruses, worms, trojan horses, bootleg software, music files, inappropriate image files], and  unpatched softw
- Malware Analysis: Possesses sufficient fundamental proficiency to successfully demonstrate Malware Analysis in practical applications of moderate difficulty. Has determined the behavior and purpose of a simple malware threat, and eliminated it from the company's computers. Familiar with Dynamic Analysis, the analysis of software during its execution on a computer or in an virtual machine, and Static Analysis, the method to look at the component without any execution on the component itself. Has used basic Malware Analysis tools and products.
- Network Forensics: Possesses sufficient fundamental proficiency to successfully demonstrate Network Forensics in practical applications of moderate difficulty.
- Anomaly Detection: Possesses sufficient fundamental proficiency to successfully demonstrate Anomaly Detection practices in practical applications of moderate difficulty. Has a basic understanding of network behavior analysis techniques and tools. Capable of using Intrusion Detection Systems software.