Baptist Health
Information Security Engineer II
Baptist Health, Montgomery, Alabama, United States, 36136
Baptist Health is the largest healthcare system serving central Alabama, providing comprehensive hospital-based and outpatient services to nearly 60 percent of the residents in Montgomery, Autauga and Elmore counties. To learn more about Baptist Health, visit us at https://www.baptistfirst.org.
The Information Security Engineer II shall be responsible for deploying and managing strategic security technologies and applications to protect Baptist Health's data, systems, network, and patients. This individual's work shall include administration of technologies such as EDR, NDR, IDS/IPS, SIEM, NAC, IAM/IGA, firewall, vulnerability management tools, monitoring of network telemetry for anomalies, responding to cyber events, and assisting with enforcement of information security policies and managing risk. This position may have additional duties assigned as needed. Description
High School Diploma required. Bachelor's or Master's degree in Computer Science, Information Systems or related field (or equivalent combination of education and work experience) preferred. Intermediate knowledge and understanding of Information Technology/Security best practices required. Minimum 2 years' experience in Information Technology, Information Security, or comparable role required. Minimum 2 years' experience securing and managing Microsoft Active Directory, securing and managing network infrastructure systems, and using scripting and automation techniques such as Microsoft PowerShell, and Python required. Minimum 2 years' experience leveraging modern information security tools and tactics such as EDR, XDR, NDR, SIEM, IDS/IPS, DF/IR, Vulnerability Management required. Experience in healthcare or related industry preferred. Continuous active engagement with Information Technology/Security self education platforms preferred. License / Certification required: Two or more of the following: CompTIA Network +, Security+, CySA+, CCNA, CEH, BTL1, BTL2, any GIAC certification required. GIAC Certified Incident Handler (GCIH) required (or ability to obtain within 9 months of hire). Additional industry recognized Information Technology or Information Security certifications preferred (GIAC, INE, Cisco, CompTIA, Microsoft, ISACA, etc.). Strong understanding of Information Security principles and tools (firewalls, intrusion detection, endpoint detection and response, digital forensics, incident response, IAM, etc.). Strong understanding of TCP/IP networking, network access control, and segmentation. Strong understanding of Windows and Linux desktop and server operating system administration. Strong understanding of server, desktop, and application virtualization technologies. Ability to analyze technical security documentation such as network penetration testing findings and other risk assessment findings. Ability to resolve complex technical problems in a timely manner. Ability to research, analyze and implement security-related solutions to business issues. Ability to work well independently and as part of a team. Ability and willingness to share technical knowledge and skills with team and cross-train team members. Ability to establish and maintain effective working relationships with managers, co-workers, customers, and partners. Ability to communicate and exchange information with others clearly and concisely. Ability to manage priorities and meet deadlines when work speed and sustained accuracy are critical. Ability to provide off-hours operational support when necessary and participate in a scheduled on-call rotation. Ability to provide exceptional support to internal and external customers. (Preferred) Working knowledge of one or more cybersecurity standards and frameworks, like NIST, COBIT, ISO 27001, etc. (Preferred) Ability to plan and execute securing IAM systems such as Active Directory. (Preferred) Ability to design and implement network access control policies using enterprise NAC systems.
High School Diploma required. Bachelor's or Master's degree in Computer Science, Information Systems or related field (or equivalent combination of education and work experience) preferred. Intermediate knowledge and understanding of Information Technology/Security best practices required. Minimum 2 years' experience in Information Technology, Information Security, or comparable role required. Minimum 2 years' experience securing and managing Microsoft Active Directory, securing and managing network infrastructure systems, and using scripting and automation techniques such as Microsoft PowerShell, and Python required. Minimum 2 years' experience leveraging modern information security tools and tactics such as EDR, XDR, NDR, SIEM, IDS/IPS, DF/IR, Vulnerability Management required. Experience in healthcare or related industry preferred. Continuous active engagement with Information Technology/Security self education platforms preferred. License / Certification required: Two or more of the following: CompTIA Network +, Security+, CySA+, CCNA, CEH, BTL1, BTL2, any GIAC certification required. GIAC Certified Incident Handler (GCIH) required (or ability to obtain within 9 months of hire). Additional industry recognized Information Technology or Information Security certifications preferred (GIAC, INE, Cisco, CompTIA, Microsoft, ISACA, etc.). Strong understanding of Information Security principles and tools (firewalls, intrusion detection, endpoint detection and response, digital forensics, incident response, IAM, etc.). Strong understanding of TCP/IP networking, network access control, and segmentation. Strong understanding of Windows and Linux desktop and server operating system administration. Strong understanding of server, desktop, and application virtualization technologies. Ability to analyze technical security documentation such as network penetration testing findings and other risk assessment findings. Ability to resolve complex technical problems in a timely manner. Ability to research, analyze and implement security-related solutions to business issues. Ability to work well independently and as part of a team. Ability and willingness to share technical knowledge and skills with team and cross-train team members. Ability to establish and maintain effective working relationships with managers, co-workers, customers, and partners. Ability to communicate and exchange information with others clearly and concisely. Ability to manage priorities and meet deadlines when work speed and sustained accuracy are critical. Ability to provide off-hours operational support when necessary and participate in a scheduled on-call rotation. Ability to provide exceptional support to internal and external customers. (Preferred) Working knowledge of one or more cybersecurity standards and frameworks, like NIST, COBIT, ISO 27001, etc. (Preferred) Ability to plan and execute securing IAM systems such as Active Directory. (Preferred) Ability to design and implement network access control policies using enterprise NAC systems.