Browse
Employers / Recruiters

Information Security Specialist

Negotiable
Full-time
Continue
By pressing the button above, you agree to our Terms and Privacy Policy, and agree to receive email job alerts. You can unsubscribe anytime.
One of Airetel Staffing's valued clients is looking for a Information Security Specialist located in Kansas City, MO.

Job Description
In this role, the Assistant Information Security Specialist primarily promotes and enhances the maturity of the core Information Security Program functions of Governance, Risk, and Compliance (GRC).


Responsibilities
  • Develops and maintains information security related documentation, e.g., policies, frameworks, standards, methods & procedures, executive presentations, corporate communications, and knowledge base (KB) articles.
  • Provide principal assistance and proactively lead coordination as Information Security Manager's designated representative for compliance related duties, e.g., scheduled reviews of internal policies and procedures, internal audits and external audits
  • Provide principal assistance and proactively lead coordination as Information Security Manager's designated representative for risk related duties, e.g., contract reviews, as well as risk assessments of newly requested software or hardware
  • The GRC Specialist serves as a critical resource for staff and leaders regarding information security policy implementation, interpretation, and compliance. This includes active communication with key stakeholders in Corporate Services and with Business Unit Leaders as appropriate.
  • The GRC Specialist assesses and prioritizes information security and cybersecurity risk across the organization, facilitates compliance with regulatory requirements and information security policies, and develops and reports on information security metrics.
  • Provide principal assistance and proactively lead coordination as Information Security Manager's designated representative for governance related duties, e.g., reviews of existing documents, as well as development of newly requested documents
  • Provide essential support on a supplemental basis as needed and as appropriate for other key functions of the Information Security program, namely Incident Response, Vulnerability Management, as well as approved Projects or Enhancements.

The GRC Specialist is responsible for reducing information security and cybersecurity risk to the company by helping to prioritize and drive remediation efforts throughout the organization through the following:
  • Establishing and maintaining governance and compliance standards.
  • Conducting risk assessments of vendor services or products, including but not limited to software, hardware, or other professional services as applicable.
  • Creating, maintaining, communicating, and enforcing information security related documentation, e.g., policies, frameworks, standards, methods & procedures, executive presentations, corporate communications, and knowledge base (KB) articles.
  • Advising senior leadership on risk management strategies, including risk mitigation, risk reduction, risk transfer, the risk exception process and residual risk analysis.
  • The GRC Specialist independently executes high-quality, enterprise-class solutions consistent with regulations and established frameworks. The GRC Specialist holds team and organization level responsibilities and may lead small to medium scale projects. The Specialist works with employees, and leaders across the company, as well as our clients, partners and suppliers, in select instances.

Governance and Compliance:
  • Develops and implements a data security risk reporting framework, aligned with designated frameworks (ISO 27001, NIST SP 800-171, etc.) for management teams and governance committees.
  • Designs and documents technical, administrative, and physical controls to ensure the business demonstrates compliance, ensuring both the requirements and intent of its regulatory and compliance obligations.
  • Facilitates the remediation of control gaps and escalates critical issues to leadership.
  • Manages an exception review and approval process, and assures exceptions are documented and periodically reviewed.
  • Prepares for and facilitates examinations by qualified security assessors for regulations such as CMMC. Works closely with control owners and internal and external auditors to ensure requests are completed in a timely manner.
  • Assists with the evaluation of the effectiveness of the information security program by developing, monitoring, gathering, and analyzing information security and compliance metrics for management.

Information Security Risk Assessment:
  • Identifies, analyzes, evaluates, and documents information security risks and controls based on established risk criteria.
  • Conducts security risk assessments of planned and installed information systems to identify vulnerabilities and risks.
  • Recommends controls to mitigate security risks identified via risk assessment process.
  • Communicates risk findings and recommendations that are clear and actionable by business stakeholders.

Security Policy Management and Workforce Training and Awareness:
  • Supports workforce security activities including culture, awareness, and training.
  • Facilitates eDiscovery and collection of data to support investigations of possible security or policy violations. Analyzes information security incidents in collaboration with other stakeholders. Coordinates remediation and awareness training.
  • Researches, recommends, and contributes to information security polices, standards, and procedures. Assists with the lifecycle management of information security policies and supporting documents.
  • Works with other organizational participants to implement information security policies.

Third-party Supplier and Vendor Risk Management:
  • Performs third-party supplier risk assessments to ensure supply chain risk is managed throughout the supplier's lifecycle. Assesses and reports on the risks and benefits for the business as well as mandates for supplier compliance.
  • Articulates results of the final assessments to business stakeholders, project sponsors, program managers, and other internal parties.
  • Assists with review of information security sections within supplier contracts, identifies gaps, and recommends security and data privacy content to close gaps.
  • Maintains inventory of relevant suppliers/vendors, controls, and risks for ongoing vendor risk management activities.


Qualifications :
  • Minimum Associates Degree in Healthcare, Information Technology, Business, or related field (2 years of relevant experience may be considered in lieu of degree in addition to experience below) (required)
  • Bachelor's or Master's degree in Healthcare, Cybersecurity, Information Technology, Engineering, Business, or related field (preferred)
  • Demonstrated success performing risk assessments, writing policies to comply with governmental regulations, or implementing other key GRC functions. (required)
  • Demonstrated success leading small to medium scale projects. (required)
  • 5-7 years of progressively responsible experience in a healthcare setting, addressing risk compliance with regulatory requirements (e.g., ISO 27001, SOC 2, PCI DSS, FedRAMP,) (preferred)
  • Advanced certifications such as HCISSP, CISSP, CEH, CISM, CISA, CCSP, and/or specific training and certification in security risk management and IT controls frameworks, such as NIST CSF and 800-53 and 800-171. (preferred)

Airetel Staffing, Inc. is nationally recognized as Best of Staffing - Diamond Award Winner. For more details or to view other opportunities, visit us at www.airetel.com or call 214-353-0561.

Last updated on May 15, 2023

See more

More jobs at c4jdnwc7x3stjcj6zixxnwiepq2dyk03b8lddp27c7hr98p88sagx6olnglsveeo

Analyzing

Salt Lake City, Utah

 · 

30+ days ago

Kansas City, Missouri

 · 

30+ days ago

Houston, Texas

 · 

30+ days ago

Houston, Texas

 · 

30+ days ago

Home, Pennsylvania

 · 

30+ days ago

More jobs like this

Analyzing
ELECT - IT Security Analyst 2
B
b6jdnwcpcemgg8el3r9winlpunj8hc038b1vkhowrzxn9gitznreodi38t7rirkp

Richmond, Virginia

 · 

30+ days ago

Information Security Officer
9
9xjdnwf8nt489qdiu4ab0qq7clsnet01f27n6pjaxju02yq1u697ou3dvfougsq9

Santa Clara, California

 · 

30+ days ago

Security Engineer
0
01jdnwg028j5z7sqr5v2kknizydum00361uo9lv9r7k3dur17h5v7wx2rj64vu35

Frisco, Texas

 · 

30+ days ago

Security Analyst
Q
qualis-corporation

Huntsville, Alabama

 · 

30+ days ago

KNG OF PRUSSA, Pennsylvania

 · 

30+ days ago

Fredericksburg, Virginia

 · 

30+ days ago

Security Engineer | Fully remote
T
two95-international-inc-3

Remote

 · 

30+ days ago

Marinette, Wisconsin

 · 

30+ days ago

Remote

 · 

30+ days ago

Developed by Blake and Linh in the US and Vietnam.
We're interested in hearing what you like and don't like! Live chat with our founder or join our Discord
Changelog
🚀 LaunchpadNov 27
Create a site and sell services based on your resume.
🔥 Job search dashboardNov 13
Revamped job search UI with a sortable grid, live filtering, bookmarks, and application tracking.
🫡 Cover letter instructionsSep 27
New Studio settings give you control over AI output.
✨ Cover Letter StudioAug 9
Automatically generate cover letters for any job.
🎯 Suggested filtersAug 6
Copilot suggests additional filters above the results.
⚡️ Quick applicationsAug 2
Apply to jobs using info from your resume. Initial coverage of ~200k jobs in Spain, Germany, Austria, Switzerland, France, and the Netherlands.
🧠 Job AnalysisJul 12
Have Copilot read job descriptions and extract out key info you want to know. Click "Analyze All" to try it out. Click on the Copilot's gear icon to customize the prompt.
© 2024 RemoteAmbitionAffiliate · Privacy · Terms · Sitemap · Status