×
Register Here to Apply for Jobs or Post Jobs. X

IT Director

Job in California, Moniteau County, Missouri, 65018, USA
Listing for: Pacific Health Group
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Location: California

About Pacific Health Group

At Pacific Health Group, we are at the forefront of revolutionizing healthcare. You will play a vital role in this mission. We are dedicated to improving health outcomes by addressing social determinants of health and coordinating comprehensive community-based services, particularly through our programs. If you are passionate about making a difference and thrive in a dynamic, mission-driven environment, we invite you to join our team.

Overview

The Director of Information Technology & Information Security is responsible for the end-to-end ownership of all technology systems, data security, and regulatory compliance at Pacific Health Group. This role establishes, governs, and enforces the organization’s security posture, ensuring that all systems, data, and operations meet or exceed HIPAA, HITECH, and industry best practices.

This position functions as the single point of accountability for IT infrastructure, cybersecurity, data protection, PHI safeguards, and security governance. The role requires both strategic leadership and hands‑on execution in a regulated healthcare environment.

Core Areas of Responsibility

  • Information Security Program Ownership
    • Architect and maintain a formal, organization‑wide Information Security Program.
    • Define and enforce security controls across applications, infrastructure, devices, and users.
    • Establish policies for data classification, encryption, access control, logging, monitoring, and retention.
    • Ensure least‑privilege access and zero‑trust principles are implemented across systems.
    • Continuously monitor evolving threat landscapes and proactively adapt controls.
  • HIPAA, PHI & Regulatory Compliance
    • Serve as the internal authority for HIPAA Security Rule and Privacy Rule compliance.
    • Ensure proper safeguards for the creation, storage, transmission, and disposal of PHI.
    • Maintain compliance documentation, risk assessments, and audit evidence.
    • Lead HIPAA risk analyses and remediation plans.
    • Oversee Business Associate Agreements (BAAs) from a security and IT standpoint.
    • Coordinate and support internal and external audits, assessments, and investigations.
  • IT Infrastructure & Systems Oversight
    • Own the design, implementation, and maintenance of all IT systems, including:
      • Cloud platforms
      • Networks and connectivity
      • End‑user devices and endpoints
      • SaaS applications and internal tools
      • Ensure systems are secure, resilient, and scalable.
    • Implement and maintain:
      • Backup and disaster recovery plans
      • Business continuity procedures
      • System redundancy and failover strategies
    • Approve and govern all technology deployments and architectural changes.
  • Cybersecurity Operations & Incident Response
    • Establish formal incident response plans and escalation procedures.
    • Lead response efforts for security incidents, attempted breaches, phishing, impersonation, or data exposure.
    • Conduct root cause analysis and implement corrective actions.
    • Ensure proper breach notification processes are followed when required by law.
    • Maintain logs, alerts, and monitoring systems to detect suspicious activity.
  • Data Protection & Privacy
    • Define and enforce controls for sensitive data, PHI, and confidential business information.
    • Ensure encryption standards are applied to data at rest and in transit.
    • Govern data access, sharing, and retention policies.
    • Partner with legal and compliance stakeholders on privacy matters.
    • Prevent unauthorized data access, leakage, or misuse.
  • Vendor, Tool & Third‑Party Risk Management
    • Evaluate security posture of third‑party vendors and platforms.
    • Approve technology vendors based on security, compliance, and risk criteria.
    • Monitor ongoing vendor compliance and contractual obligations.
    • Ensure third‑party access is controlled, monitored, and revoked as needed.
  • Governance, Training & Enforcement
    • Develop and enforce IT and security policies applicable to all staff.
    • Deliver security awareness training, including phishing and impersonation prevention.
    • Ensure staff understand approved communication channels and security protocols.
    • Investigate and address violations of IT or security policy.
    • Establish clear escalation paths and disciplinary guidance related to security breaches.
  • Strategy, Reporting & Executive Advisory
    • Define a…
  • To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary