Logo
MetroPlus Health Plan

MetroPlus Health Plan is hiring: IT Security Engineer in Grand Central

MetroPlus Health Plan, Grand Central, NY, US


IT Security Engineer Job Ref: 99336 Category: Information Technology Department: MHP INFORMATION SECURITY Location: 50 Water Street, 7th Floor, New York, NY 10004 Job Type: Regular Employment Type: Full-Time Hire In Rate: $117,000.00 Salary Range: $117,000.00 - $127,000.00 Empower. Unite. Care. MetroPlusHealth is committed to empowering New Yorkers by uniting communities through care. We believe that Health care is a right, not a privilege. If you have compassion and a collaborative spirit, work with us. You can come to work being proud of what you do every day. About NYC Health Hospitals MetroPlus Health provides the highest quality healthcare services to residents of Bronx, Brooklyn, Manhattan, Queens and Staten Island through a comprehensive list of products, including, but not limited to, New York State Medicaid Managed Care, Medicare, Child Health Plus, Exchange, Partnership in Care, MetroPlus Gold, Essential Plan, etc. As a wholly-owned subsidiary of NYC Health Hospitals, the largest public health system in the United States, MetroPlus Health 's network includes over 27,000 primary care providers, specialists and participating clinics. For more than 30 years, MetroPlus Health has been committed to building strong relationships with its members and providers to enable New Yorkers to live their healthiest life. Position Overview The security engineer is responsible for implementing, maintaining, monitoring and managing secure solutions. The engineer delivers these solutions in accordance with the organization's architectural designs, best practices, and regulatory or compliance requirements. As risks change, the security engineer is responsible for recommending modifications and enhancements to ensure the organization is evolving with the threat landscape. The security engineer is expected to contribute to the corporate security strategy with security leadership and other senior security staffers and technologists. Recipients of the engineer's implementations and management include IT infrastructure, application development, security operations, security audit and end users. With an emphasis on securing systems, applications, third-party connections, service providers and ancillary systems, the security engineer is responsible for securing business-to-business initiatives, third-party relationships, outsourced solutions and vendors. Considered a highly knowledgeable individual, the security engineer is expected to implement, monitor and manage secure solutions that address modern day issues. Job Description Handle day-to-day implementation, monitoring and operational support of security hardware, software, customer applications, and managed solutions. Actively participate security team meetings that facilitate secure design. Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time and within budget. Assist with incident response and system stability issues as they occur. This may include involvement outside of regular work hours, and responsiveness is expected. Implement solutions observing compliance - Health Information Portability and Accountability Act (HIPAA), Payment Card Industry (PCI), New York State Department of Financial Services Cybersecurity Requirements (23 NYCRR 500). Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members. Respond to and handle service and escalation tickets within SLA expectations. Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted. Participate in change project and change management meetings as required. Research, validate and deploy solutions meeting security and business needs. Follow security engineering fundamentals and processes as outlined in NIST 800-160 Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention). Focus on driving security efficiencies, enabling security team members to work on more advanced tasks. Conduct performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted. Perform other duties as assigned Minimum Qualifications Bachelor's degree in computer science, information assurance, Cybersecurity or related field, or equivalent. 10 years of related experience required. Licensure and/or Certification Required CISSP (preferred); CISM and/or SANS certification or Cisco-related certifications a plus. Professional Competencies Experience with: Microsoft Azure or Amazon Web Services (AWS). Vulnerability tools such as Rapid7, Qualys, Nessus, NMAP, Kismet, Airsnort SIEM platforms and technologies Private and Public PKI Infrastructure Network security management, design, and deployment. DevOps background with experience in compliance obligations. Experience with one or more of the following standard frameworks: ISO 27001, NIST, PCI Data Security Standard (PCI DSS), HIPAA, Health Information Technology for Economic and Clinical Health (HITECH) Act, Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2. Working knowledge of Windows and Linux. Familiarity with state privacy laws. Ability to think strategically and tactically, with effective decision-making skills. Highly trustworthy; leads by example. Experience supporting and utilizing SIEM platforms. Working technical knowledge of Advance Threat Protection tools such as Crowdstrike, Trellix, etc. Next Generation Firewalls (NGFW), Software-Defined Wide Area Networking (SD-WAN), Advanced Threat Protection and Sandboxing solutions. Detection/Prevention Systems: Anomaly-based, signature-based, and host-based. DLP and Data in rest encryption. L-Hybrid