As a Cyber Security Architect reporting to the Manager of Information Security, this role entails the strategic management of cybersecurity frameworks, policies, and technical systems to uphold the confidentiality, integrity, and availability of all District Health Care Information Systems, aligning with the mandates of HIPAA.
The Cyber Security Architect is expected to possess a diverse skill set, encompassing comprehensive knowledge of cybersecurity policies, regulatory compliance, and expertise in addressing various technologies and client needs. Seamless interaction with all District departments is paramount. This position necessitates a high level of IT proficiency in cybersecurity, encompassing the ability to conduct security risk assessments within the healthcare industry. A fundamental requirement is the proficiency in designing and implementing hands-on security solutions. Technical acumen includes mastery of application and operating system hardware, vulnerability assessments, security audits, TCP/IP, log monitoring, intrusion detection systems, firewalls, among others. Exceptional communication, interpersonal, and consultative skills are essential. The Cyber Security Architect must uphold a strong ethical standard, work both independently and collaboratively with infrastructure teams, and exhibit demonstrated organizational, facilitation, and presentation skills. Thorough documentation capabilities are crucial. The role mandates a nuanced understanding of business risks, ensuring the enforcement of appropriate cybersecurity measures. Knowledge and experience in information privacy laws, particularly HIPAA Security Rule, and other pertinent government technology laws, are imperative for success in this role.
Additional Duties:
The list of essential functions, as outlined herein, is intended to be representative of the tasks.
performed within this classification. It is not necessarily descriptive of any one position in the class.
The omission of an essential function does not preclude management from assigning duties not listed herein if such functions are a logical assignment to the position.
Education:
Bachelor's degree inInformation Technology or related field with a concentration in information technology security. An equivalent combination of experience, along with high school diploma or GED, may substitute for minimum education.
requirements.
Experience:
6+ years of hands-on experience, specializing in orchestrating security, initiatives, and possessing a deep understanding of M365 Security and Compliance technologies, security architecture and engineering.
Proven expertise in architecting security solutions within the Microsoft 365 ecosystem, including mastery of Exchange Online, SharePoint Online, Microsoft Office Suite, and Power Platform.
Exceptional communication skills, serving as a crucial asset for leading collaborative efforts and seamlessly sharing critical information across diverse teams.
Comprehensive mastery of a broad spectrum of security technologies, emphasizing advanced proficiency in Microsoft 365 Security and Compliance tools.
Proven experience with an array of security products, showcasing expertise in security solutions, firewalls, network access, and DNS security. This breadth of knowledge extends beyond Microsoft technologies, providing a holistic understanding of security solutions.
Certifications:
Possession of industry-recognized certifications such as Certified Information Systems Security Professional (CISSP) and Microsoft Information Protection and Security certifications, underscoring a commitment to maintaining the highest standards in cybersecurity architecture.
Health Care District of Palm Beach County is proud to be an Equal Opportunity Employer and Drug Free Workplace. We embrace diversity and do not discriminate based on race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Software Powered by iCIMS
www.icims.com