Skip Navigation

Information Security Compliance Analyst



Category

Information Technology

Job Location

NA, NA

Tracking Code

72121-2

Position Type

Full-Time/Regular

About Us

Certilytics provides sophisticated predictive analytics solutions to major healthcare organizations by integrating financial, clinical, and behavioral insights. Our team represents a dynamic infusion of multidiscipline, which includes actuarial, data and behavioral scientists, IT engineers, software developers, nurse clinicians, as well as experts in public health and the health insurance industry. Certilytics has extensive experience working with a diverse set of customers including large self-insured employers, health plans, pharmacy benefit managers, government programs, care management companies and health systems. These relationships with various data providers and customers allows for rapid data ingestion, validation and enrichment as well as streamlined delivery of analytic dashboards, outputs and visualizations to our customers. Our unique approach allows for the development of the most accurate financial, clinical and behavioral models in the industry.

 

The Information Security Compliance Analyst is responsible for monitoring the identification of security requirements, the identification or development of business processes to support those requirements, development and coordination of creating information security documentation of those processes, and executing and coordinating internal and external information security audits to ascertain the level of compliance and any deficiencies in the program.

 

The Information Security Compliance Analyst also assists with other information security responsibilities as required.

Audit

  • Coordinate and/or participate in responding to information security risk assessments, requests for proposal, audits, and examinations
  • Perform operational and independent information security auditing and reviews
  • Ensuring that submitted evidence for audits meets requirements and will satisfy audits performed by third party auditors
  • Auditing requirements as an independent internal information security auditor as needed
  • Validate security through management and coordination of internal and external audits
  • Develop, operate, and maintain an internal continuous monitoring program that provides oversight of the security program on a regular basis
  • Assess product compliance with compliance and make recommendations regarding external third parties, and new technologies

 Design

  • Identify requirements from various sources including adopted security frameworks
  • Perform process architecture to identify existing business process or creating new business process to support requirements
  • Maintain, develop, and coordinate same for supporting policy and documentation of information security business processes and requirements
  • Determine feasibility of meeting security requirements based on contracts or statements of work with external entities and identify deficiencies and methods to remediate
  • Developing the maturity of existing requirements though measurement and management of their effectiveness

 Detect

  • Assist other information security personnel with their duties as required
  • Identify information security gaps and identify potential solutions for resolution

 Protect

  • Perform risk management internally to the organization. Identify and prioritize risks, identifying options for remediation, assessing costs and levels of risk, and make recommendations to leadership regarding final risk mitigation plans.
  • Host information security-based organizational meetings, such as daily change/problem management, and tactical information security management coordination meetings
  • Remediation of control deficiencies where appropriate
  • Identify out of parameter measures or metrics from audit and review results, taking remedial action and engaging appropriate stakeholders.

 Administrative

  • Maintain currency of job knowledge and CISSP certification
  • Generate ad hoc reports and queries in security tools as required
  • Provide reporting on the state of the organizational security profile and activity
  • Manage security-related projects including remediation of vulnerabilities, establishment of new processes, coordination of vendor activities and audits
  • Mentor other staff as required
  • Other duties as assigned.

 


Required Skills

  • Bachelor’s degree in Computer Science, Information Security, or similar degree program, or equivalent work experience.
  • At least five years’ experience as an information security professional or equivalent information security related field.
  • Must possess broad general knowledge of information technology, including storage, networking, systems, databases, firewalls; with a preference for experience as one or more of the following: software developer, system or network engineer, database administration, or an equivalent technical role.
  • Conceptional knowledge of and experience with monitoring and using a wide variety of security tools, including but not limited to host and network-based intrusion prevention/detection systems, firewalls, anti-malware, and content filtering, firewalls, vulnerability management, security information and event management; network detection and response, network and host-based data loss prevention, and asset management.
  • Experience or excellent familiarity with HITRUST, NIST SP 800-171, GDPR, and HIPAA security/privacy frameworks/legislation is required. Experience with or knowledge of other security frameworks is desirable.
  • Must possess excellent communication skills, particularly in writing, and with the ability to discuss or describe technical concepts with non-technical people.
  • High proficiency MS Word, and proficiency with MS Office applications; such as PowerPoint, and Visio; and MS SharePoint.
  • Jedi-like skill with Microsoft Excel.
  • Project management skills.
  • Ability to work an on-call rotation, some after-hours, and weekends.

Required Experience

Special Qualifications: (Licenses, certifications, etc.)

Required: CISSP (or CISSP Associate of (ISC)2) certification required

Desired:

  • Cloud Computing Security Certifications (e.g., CCSP, CCSK, CompTIA Cloud+, CCA, CCP, AWS Certified Security – Specialty, etc.) highly desired.
  • Other relevant Information Security certifications are desirable, including but not limited to: CISA, CISM, CRISC, SANS GIAC, SANS GSEC, and Security+.
  • Knowledge of or certification in ITIL desirable.

Information Security Requirements:

 Role Specific

  • Hold and maintain a CISSP (or Associate of (ISC)2) certification.
  • Perform a minimum of 40 hours annual security training as planned with your supervisor.
  • Abide by all security policies and practices defined by the organization.
  • Abide by all applicable laws and regulations.
  • Upon hire and annually, acceptance of:
    • Acceptable Use Agreement
    • Certilytics Statement of Confidentiality,
    • Certilytics Confidentiality and Invention Assignment Agreement,
    • These information security requirements.
  • Upon hire and annually, successful completion of training in:
    • Security Awareness and Privacy,
    • Code of Business Ethics,
    • Conflict of Interest,
    • Developer Security,
    • Incident Response, and
    • Other training as directed by your manager.
  • Serve as a technical responder of the Security Incident Response Team, and the Disaster Recovery Team

 

General

  • Report any security incidents, breaches, violations, or non-compliance with security policy when identified or witnessed.
  • Report any identified security risks or vulnerabilities.
  • Cooperate with Company, local, state, or federal investigators in the event of a security incident and/or breach.
  • Report any complaints concerning the information security policies and procedures or the organization's compliance with the policies and procedures program by submitting a Help Desk ticket or reporting to the Information Security team.
  • Report any ideas for improvement of the organizational security program by submitting a Footprint ticket or by directly suggesting to the CISO.

close