Epic Application Security & SER Coordinator
Listed on 2025-12-22
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Systems Analyst
Epic Application Security & SER Coordinator
Join to apply for the Epic Application Security & SER Coordinator role at Children's National Hospital
.
Base pay: $85,404.80/yr - $/yr.
Job OverviewThe Epic Security Coordinator plays a key role in managing application-level security across the Epic environment by defining and maintaining access standards, templates, and roles. The position is a centralized point of accountability for coordinating Epic security governance, aligning security structures with compliance requirements, and facilitating enterprise-wide collaboration across technical, operational, and clinical stakeholders.
Responsibilities- Define the overarching Epic security strategy, establishing standards, naming conventions, and operational procedures that support secure, scalable, and auditable access across the enterprise.
- Lead a multidisciplinary Epic Security Workgroup to align shared security structures, template ownership, and education efforts.
- Partner closely with the Identity & Access Management (IAM) team to ensure Epic security models are integrated into the organization’s broader access framework.
- Lead the strategy, governance, and ongoing maintenance of provider (SER) records, ensuring data accuracy, consistency across modules, and alignment with scheduling, clinical, and billing workflows.
- Build and maintain Epic security templates, shared security classes, and application-level role structures in collaboration with analysts and business partners.
- Set and document standards for naming conventions, template usage, ownership definitions, and cross-application alignment.
- Facilitate a multidisciplinary Epic Security Workgroup with representation from application teams, compliance, IAM, and operations, setting timelines, decision points, and outcomes.
- Lead operational security support, including Epic security needs related to operational readiness, workflow testing, application admin template creation, test user maintenance, shadow charting access, integrated testing, login labs, personalization labs, and role-based scenario validation.
- Collaborate with clinical, business, and application teams to ensure temporary and non-production access is secure, appropriate, and clearly documented.
- Partner closely with the IAM team to align role-based access models with Epic security templates and coordinate downstream provisioning through tools like SailPoint.
- Establish a repeatable, auditable process for security updates—including testing, approval, and communication plans for template changes—and maintain version control and history for Epic security structures.
- Create and maintain documentation to support Epic security structure understanding across analyst teams, and lead training sessions and awareness campaigns.
- Facilitate security-related planning and execution during major Epic events (e.g., go-lives, upgrades, audit response) and contribute to risk mitigation strategies related to role structure, over-permissioning, or shared access issues.
Bachelor's Degree in Health Informatics, Information Systems, Computer Science, Cybersecurity, or a related field.
Minimum Work ExperienceMinimum three (3) years of experience in healthcare IT, with at least 3 years focused on application security.
Preferred: 3 years experience participating in Epic security design during implementations, upgrades, or system optimization initiatives.
Preferred: 3 years prior involvement in security governance, policy setting, or cross-functional coordination in a hospital or academic medical center environment.
Preferred: 3 years familiarity with SailPoint or enterprise IAM platforms.
Required Skills & Knowledge- Expertise in Epic Security Architecture—strong knowledge of Epic security templates, user roles, security classes, and provider configuration; ability to manage cross-module security alignment.
- Collaboration & Governance—proven ability to lead multidisciplinary teams, build consensus, and drive decision-making related to security structures, standards, and lifecycle processes.
- Process Orientation & Attention to Detail—skilled in managing template versioning, documentation, change control, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).