Epic Security Analyst II
Listed on 2025-12-29
-
IT/Tech
IT Consultant, Systems Analyst
Join to apply for the Epic Security Analyst II role at Orlando Health
1 day ago Be among the first 25 applicants
Position SummaryDepartment:
Information Technology
Status:
Full-Time
Shift: Monday - Friday, 8am-5pm, hybrid (2x a week onsite) in Orlando, FL
- On Call Required*
At Orlando Health, we are ordinary people with extraordinary individuality, working together to bring help, healing and hope to those we serve. By daily embodying our over 100-year legacy, we reinforce our reputation as a trusted and respected healthcare organization that delivers professional and compassionate care to our patients, families and communities. Through our award‑winning hospitals and ERs, specialty institutes, urgent care centers, primary care practices and outpatient facilities, our 27,000+ team members serve communities that span Florida’s east to west coasts and beyond.
Benefits& Perks
- Student loan repayment, tuition reimbursement, FREE college education programs, retirement savings, paid paternity leave, fertility benefits, backup elder and childcare, pet insurance, PTO/Holidays, and more for full time and part time employees.
- Forbes has named Orlando Health as one of America's Best-In-State Employers for 2024. Orlando Health is the top healthcare organization in the Metro Orlando area to make the prestigious list. "We are proud to named once again as a best place to work," said Karen Frenier, VP (HR). "This achievement reflects our positive culture and efforts to ensure that all team members feel respected, supported and valued.
- Orlando Health has been selected as one of the “Best Places to Work in Healthcare” by Modern Healthcare
Under the direction of the Manager, Identity Access Management and in support of the chief information security officer (CISO) and Orlando Health organizational business units, the Epic Security Analyst II, will provide consultation and guidance to the development, internal application and technical teams, and the third‑party Epic EMP/SER provisioning vendor to maintain optimal protocols for granting and revoking appropriate end‑user access for supported applications.
The Epic Security Analyst II will be responsible for the administration and coordination of all tasks related to SER, security tools and policies and processes for Epic. This position provides outstanding client service and must be very knowledgeable about policies, procedures and business operations.
- Establishes Epic security protocols, in consultation with appropriate organizational stakeholders, and maintain the security of the Epic application.
- Understands the foundational structures of Epic software, including profiles, roles, menus, and security classes, as well as network and device security relating to Epic and Epic end users.
- Performs daily Epic security administration functions, including managing customer access requests, creating and/or deleting user profiles and accounts, maintaining appropriate documentation, and monitor and audit access logs.
- Performs provider import/build as needed, and cross‑referencing user lists.
- Within the Epic system, develops, manages, and maintains standard security configuration, security classes and templates, security class ownership, blueprints, and provisioning/deprovisioning of application security levels and roles.
- Works with Epic application teams to design system‑level access, such as logout times, and lead decisions related to ownership and change delegation guidelines.
- Takes ownership on process improvement in Epic Security provisioning, monitoring and auditing.
- Provides day‑to‑day troubleshooting, analysis and resolution related to provider record issues.
- Works with Epic project representatives to complete design, build and testing tasks in accordance with the project plan.
- Identify issues that arise within security and provider configuration as well as issues that affect other application teams, and work to reach resolution.
- Builds and maintains Knowledge Base, and any other Epic Security related process, procedures and policies.
- Identifies and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).