10+ years of working in IT and security.
Practices and methods of IT strategy, enterprise architecture and security architecture
Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
ISO 27002, ITIL and COBIT frameworks — desirable
Windows, UNIX, and Linux operating systems
Firewall and intrusion detection/prevention protocols
Secure coding practices, ethical hacking and threat modeling
TCP/IP, computer networking, routing and switching
Network security architecture development and definition
Knowledge of third party auditing and cloud risk assessment methodologies
Professional and friendly team
Convenient offices location
Flexible work schedule
Paid Vacation, Sick Days, etc.
Lead in the development/adoption and enforcement of Information Security policies, procedures, and standards
Maintain the AMC Bridge Security Policies. These are formal policies that detail and document actual mechanisms and controls
Maintain the AMC Bridge Security Procedures
Maintain appropriate security measures and mechanisms to guard against unauthorized access to electronically stored and /or transmitted patient data and protect against reasonably anticipated threats and hazards
Oversee and/or assist in performing on-going security monitoring of organization information systems
Ensure compliance with adequate training programs and periodic security audits. These audits should be both internal and external in nature
The information security officer (ISO) should drive the IT security strategy and implementation forward whilst protecting the business from security threats and cyber-hacking. Operational compliance to all security standards and regulations is the responsibility of ISO.