Join our Talent Network
Skip to main content

*Important Notice:

Thank you for your continued interest in career opportunities with UNC Health! Please note the following:

  • Positions are only open current UNC Health employees.
  • Please be sure to have your employee ID number and UNC Health email address available.

Current UNC Health employees, please log-in to Employee Self Service to view open jobs and apply. We invite all current UNC Health employees to fill out their Talent Profile. From Employee Self Service, as an Employee user, go to My Profile, then Talent Profile. Create your Credentials, Education and Employment History to complete your Talent Profile. Your Talent Profile can be used for current and future job applications.

Need further assistance? Please submit a request through the myHR Portal.

*Please note: The Discovery Employee Referral Program is temporarily unavailable. Due to the recent switch in our HR and application systems, our HR team is working hard towards implementing a new and improved, mobile friendly Employee Referral solution. More details are to come soon! Thank you for your patience.

HCS Information Security Analyst Senior - IT Security

Job ID: 1151
Location: Morrisville, NC
Facility/Division: Shared Services
Status: Full Time
Shift: Day Job

Job Description

Description

Become part of an inclusive organization with over 30,000 diverse employees, whose mission is to improve the health and well-being of the unique communities we serve.

This position may involve support of various hospitals and health care systems within the UNC Health Care System, but will be employed by Rex Hospital, Inc. (this includes, but is not limited to, for purposes of payroll, health benefits, retirement options, and applicable policies).

Information Security Analyst Sr provides a high level of technical expertise of information security appliances, software and hardware which deliver defense in depth protection of information technology resources and confidential data across the health system. Performs project management, requirements analysis, security systems design, and implementation of security technologies. Translates data to information to support risk based decision making.

Description of Job Responsibilities:

1. Vulnerability Management - Maintains inventories and inventory processes of information resources protected by security regulations so vulnerability assessments can be performed. Uses tools and processes to effectively carry out vulnerability testing. Monitors and improves vulnerability management processes and procedures. Interprets scanning or testing results and provides consultation to network, workstation, systems, or web-applications administrators regarding system and application weaknesses. Appropriately escalates issues presenting unacceptable risk to the institution. Monitors risk mitigation progress.

2. Security Architecture, Consulting and Evaluation - develops security architecture components for newly proposed information systems and technologies using diagrams and narratives. Assists in materializing security architecture into projects. Develops and maintains and applies tools, processes and procedures to evaluate suitability of security configuration and feature offerings of proposed systems.

3. Information Security Risk Analysis - Develops, maintains and applies tools, methods and processes to analyze risk from threats to confidential information. Writes appropriate recommendations that will bring risks to an acceptable level. Develops and delivers audience appropriate information security assessment and recommendation presentations and reports. Establishes and maintains sound metrics to track and demonstrate information security improvement and risk management. Prepares risk assessment reports for technical and executive audiences.

4. Security Incident Prevention, Detection and Handling - Develops, maintains, communicates and applies incident management policy, standards and procedures. Researches, evaluates, recommends, designs technical policies for and implements security technologies such as web content filtering systems, email filtering systems, end point protection systems, network firewall systems, intrusion prevention and detection systems (IDS/IPS), data loss protection (DLP) systems, security incident event management (SIEM) systems to prevent, detect and respond appropriately to threats to confidential information and information resources. Monitors security systems; recognizes anomalies of various systems, and handles or escalates appropriately. Writes professional and factual incident reports. Makes recommendations for recovery and prevention.

5. Data Analysis - Analyzes security threat intelligence, tunes and calibrates security systems to improve effectiveness. Analyzes and correlates network dataflow logs, web logs, computer and application user activity logs, and security incident logs for information relevant to a real or potential information security or privacy breach or to support decision making and risk mitigation.

6. Project Management - Lead discovery and information gathering sessions. Perform alternatives analysis documenting pros and cons, cost, feasibility, risk and other information to support a decision to select the best solution. Manage small to medium projects; assemble project participants to organize work to complete specific tasks on projects. Organize and facilitate meetings to identify and remove barriers, and to progress work. Follow-up with assignees on incomplete tasks and open issues. Provide detailed communication between disparate teams to keep project moving.

7. Other – Trains and assists less experienced information security staff and IT staff regarding security methods for systems they support. Takes on-call for urgent security events.

Other Information

Other information:
Education Requirements:
● Bachelor’s degree in Computer Science, Information Systems Management or a related field (or an equivalent combination of education, training and experience) required.
Licensure/Certification Requirements:
● No licensure or certification required.
Professional Experience Requirements:
● If a Bachelor's degree: Eight (8) years in professional IT positions, with 4 years of experience in related job functions required.
● If an Associate's degree: Twelve (12) years in professional IT positions, with 4 years of experience in related job functions required.
● If a high school diploma or GED: Sixteen (16) years in professional IT positions, with 4 years of experience in related job functions required.
Knowledge/Skills/and Abilities Requirements:
● #NAME?


Job Details

Legal Employer:

Entity: Shared Services

Organization Unit:  

Work Type: Full Time

Standard Hours Per Week: 40.00

Work Schedule: Day Job

Location of Job: US:NC:Morrisville

Exempt From Overtime: Exempt: Not Applicable



This position is employed by NC Health (Rex Healthcare, Inc., d/b/a NC Health), a private, fully-owned subsidiary of UNC Health Care System, in a department that provides shared services to operations across UNC Health Care. This is not a State employed position.
Share: mail
Recent Job Searches
Recently Viewed Jobs

Diversity Statement

The UNC Health System and the UNC School of Medicine are committed to valuing all people throughout our organization, regardless of background, lifestyle, and culture. A diverse and inclusive work environment for staff and culturally appropriate care for our patients, are essential to fulfilling our UNC Health vision of improving the health of all North Carolinians.

Equal Employment Opportunity

UNC Health is an equal opportunity employer. As such, UNC Health offers equal employment opportunities to applicants and employees without regard to race, color, religion, sex, national origin, age, genetic information, disability, sexual orientation, gender identity or political affiliation.

To verify employment eligibility, UNC Health is committed to Form I-9 and the E-Verify process. Learn further E-Verify details in English or Spanish.

UNC Health supports your right to work. View the Right to Work Statement in English or Spanish.