Senior Information Security Engineer - Great Falls, United States - Benefis Health System

    Default job background
    Description
    Benefis is one of Montana's largest and premier health systems, and we are committed to providing excellent care for all, healing body, mind, and spirit. At Benefis, we work hard to support our employees in every aspect of their careers by offering outstanding benefits and compensation, state-of-the-art facilities, and multiple growth opportunities. The only thing missing is you

    Evaluates, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defenses and resources. Monitors network to actively remediate unauthorized activities; performs related work.

    Demonstrates the ability to deal with pressure to meet deadlines, to be accurate, and to handle constantly changing situations. Demonstrates the ability to deal with a variety of people, deal with stressful situations, and handle conflict.

    Will perform all job duties or job tasks as assigned. Will follow and adhere to all requirements, regulations and procedures of any licensing board or agency. Must comply with all Benefis Health System's organization policies and procedures.

    Education/License/Experience Requirements:
    • BA/BS degree in a technology field or suitable work experience in a security role.
    • At least five years of enterprise information technology experience.
    • At least three years of information security experience.
    • Relevant certification (such as the International Information Systems Security Certification Consortium, which offers the Certified Information Systems Security Professional (CISSP/HCISPP) qualification) preferred or willing to achieve certification within the first year.
    • Considerable knowledge of computer networking concepts and protocols, and network security methodologies; internal tactics to anticipate and mitigate cyber security threat capabilities and actions; risk management processes (e.g., methods for assessing, documenting, and mitigating risk).
    • Good knowledge of cyber intelligence/information collection capabilities and conducting cyber incident investigations; assessing cyber security regulatory compliance and policy & procedure writing.