×
Register Here to Apply for Jobs or Post Jobs. X

IT Security Vulnerability Management Engineer - CBO IT Security

Job in Cincinnati, Hamilton County, Ohio, 45208, USA
Listing for: The Christ Hospital Health Network
Full Time position
Listed on 2025-12-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: IT Security Vulnerability Management Engineer - CBO IT Security - Full Time - Days

IT Security Vulnerability Management Engineer

Job Description:

The Security Professional supports the Information Security department’s goals and objectives by performing multiple technical or functional roles. Information Security’s goals and objectives are to develop information, computer, network, product, application and related business security policies, and mandate minimum security standards for The Christ Hospital Health Network (TCHHN) and its associated businesses and partners; facilitate or implement tasks or processes in support of security policies and standards;

and assess compliance with such TCHHN Security policies. The security professional will actively promote awareness of these Security Policies and related security topics throughout TCHHN. Additionally the security professional will act as a subject matter expert for the CISO and perform governance, risk management and compliance (GRC) as required.

Responsibilities
  • Ensures the confidentiality, integrity and availability of current information systems appropriately utilizes resources to protect data (HIPAA/HITECH/PCI/PII, etc.)
  • Recommend, design, document, and where appropriate, implement reasonable information security solutions in line with business goals and strategies
  • Resolves operational conflicts that arise between projects and daily operations
  • Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Deploy and configure technology, partnering with IT Infrastructure teams and vendor product professional service partners
  • Work with IT teams to perform tests and uncover vulnerabilities.
  • Drive the selection, POC, implementation and operational deployment of new security technology solutions to ensure the confidentiality, integrity and availability of business data
  • Assist in fixing detected vulnerabilities to maintain a high-security standard.
  • Execute company-wide best practices for IT security.
  • Perform penetration testing.
  • Help colleagues install security software and understand information security management.
  • Investigate security breaches and other cybersecurity incidents.
  • Document security breaches and assess the damage they cause
  • Execute changes in a controlled, organized manner following established change management processes
  • Manage, monitor, execute security operational tools to include (but not limited to):
  • Intrusion Prevention Systems/next generation firewall
  • Web Content Filter
  • Advanced Persistent Threat systems and analysis
  • Forensic toolsets
  • Advanced next generation anti-virus & malware toolsets
  • Email security virtual appliances
  • Logging/Monitoring/Incident Detection systems
  • Stays current on HIPAA, HITECH, PCI and other relevant security regulations

Performs other duties as necessary or assigned by the Chief Information Security Officer and Executive Management

Risk Management / Compliance / Governance
  • Tracks and manages information security risks and identifies information security vulnerabilities and facilitates required remediation activities
  • Perform risk and security impact analysis to address compliance with applicable laws, regulations, requirements and to effect positive financial security investments
  • Designs and implements internal controls/standards & procedures that ensure compliance with security standards that meet existing regulatory security requirements

Contributes to the development of policies and standards as needed to reflect evolving TCHHN needs

Leadership
  • Manage stakeholder expectations, understand business priorities and communicate security approaches and or requirements appropriately Ability to establish work standards, prioritize and deliver on key initiatives
  • Assist in the development of awareness training and communication programs to effectively communicate company security and privacy policies
  • Fosters a service-oriented atmosphere of teamwork between the business and IT
  • Must be a professional of unquestionable integrity, credibility, business ethics and character
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
  • Must be self-directed,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary