Network Security System Analyst jobs in Georgia

Network Security System Analyst ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Being a Network Security System Analyst investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Additionally, Network Security System Analyst configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager or head of a unit/department. The Network Security System Analyst occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. To be a Network Security System Analyst typically requires 2-4 years of related experience. (Copyright 2024 Salary.com)

C
Network Security Administrator
  • Crisp Regional Health System
  • Cordele, GA FULL_TIME
  • Position Summary:

    Under the leadership of the Director, Information Technology, the Network Security Administrator is an active member of the Information Technology (IT) team that works to determine the strategic vision, goals, philosophy, and direction of the department and CRHS. The Network Security Administrator is responsible for computer account auditing, assists with assessing information risk and facilitates remediation of identified vulnerabilities for IT security and IT risk across the enterprise including network, systems, and applications. Responsible for assisting with IT and HIPAA audits and the creation and maintenance of relevant policies and procedures. This position assures that information created, acquired, or maintained by the healthcare system, and its authorized users, is used in accordance with its intended purpose; to protect information and its infrastructure from external or internal threats; and to assure compliance with statutory and regulatory requirements regarding information access, security, and privacy. The Network Security Administrator is responsible for administration and support of the CRHS data and IP telephony network and related system architecture.  The Network Security Administrator is also responsible for the set-up, configuration and implementation of network hardware and software.  In addition, the Network Administrator is responsible for completion of routine day-to-day HIS processes, to include monitoring system parameters and network security on a regular basis, installation and configuration of system hardware as required, and providing end-user support as needed.

     

    Basic Qualifications:

    • Education:

    Requires an Associate’s degree or equivalent in Computer Science.  A Bachelor’s Degree is preferred.

    • Experience:

    Requires a level of experience normally acquired with a minimum of four to six years of progressively more experience within a healthcare Information Technology environment, or any equivalent combination of education, training, and experience.

    • Licensure, Registrations & Certifications:

    Requires at least two IT industry recognized technical certifications, such as A , Network , Security , CCNA, or MCSE, CISSP

     

     

    Essential Job Responsibilities:

    • Audits electronic accounts for healthcare workers, validating appropriate security levels are being utilized, and ensuring credentials given to users are in accordance with their clearance levels.
    • It leads to the development of information security policies, standards, and practices ensuring systems are securely operated and supports compliance with regulatory requirements.
    • Leads the implementation of a variety of hardware and software solutions that ensure data protection.
    • Installs and maintains software applications that filter network traffic to avoid unwanted intrusions.
    • Coordinates ongoing risk assessment programs targeting information security and privacy matters; Identifies risks by role, software, information type and other categories and defines acceptable mitigation strategies. Documents and communicates policies, queries, vulnerabilities, and current state.
    • Escalates security issues with designated leadership, proposes innovative solutions to these issues, establishes updated schedules, and configures automation to make processes faster during deployments.
    • Develops and implements security infrastructure.
    • Implements processes that deter hackers, spyware, and other malware from being installed on a computer.
    • Audits technologies and communications against information security policies and procedures to ensure compliance.
    • Performs monthly privacy audits and reports findings to the Privacy Officer.
    • Configures, maintains, and monitors company antivirus software and system event alerting, mitigates endpoint infection, and communicates any suspected critical malware or other suspicious events to management and other relevant staff for investigation and remediation.
    • Works closely with other IT teams to report suspected security incidents.
    • Leads security awareness by providing orientation, phishing campaigns, educational programs, and ongoing communication to the staff.
    • Monitors company networks to identify unauthorized use and potential security breaches from both internal and external sources.
    • Establishes system controls by developing a framework for controls and levels of access and recommends improvements.
    • Recommends methods for vulnerability detection and oversees vulnerability testing and remediation.
    • Stays abreast of all pertinent federal, state and facility regulations, laws, and policies as they presently exist and as they change or are modified.
    • Performs network administration functions that include set-up and configuration of network software and hardware for switches, routers, firewalls, etc.
    • Maintains up-to-date schematic of network infrastructure and recommends changes as needed to improve network performance. 
    • Monitors the network regularly to ensure network security. 
    • Serves in on-call rotation for system and network support.
    • Maintains a basic working knowledge of the Cerner EMR.
    • Maintains a current hardware and software inventory, accurately reflecting existing IT Network infrastructure. 
    • Obtains vendor quotes for requested hardware, software, and IT-related supplies for the best price and assists in budgeting.
    • Provides end-user support for hardware and software as requested and completes end-user work requests in an efficient and timely manner. 
    • Conducts system and network “in-service” training for hospital staff and physician end-users as needed.
    • Coordinates the efforts of vendor contract personnel for hardware and network support as needed on IT projects. 
    • Works efficiently and effectively toward the successful completion of team goals and objectives. 
    • Performs other related job duties as assigned.

     

    Standards of Performance:

    • Audits electronic accounts for healthcare workers, validating appropriate security levels are being utilized, and ensuring credentials given to users are in accordance with their clearance levels.
    • Implements processes that deter hackers, spyware, and other malware from being installed on a computer.
    • Leads security awareness by providing orientation, phishing campaigns, educational programs, and ongoing communication to the staff.
    • Establishes system controls by developing a framework for controls and levels of access and recommends improvements.
    • Recommends methods for vulnerability detection and oversees vulnerability testing and remediation.
    • Provides administration and support services for CRHS’s data and IP telephone network and related system architecture. 
    • Performs the initial set-up and configuration and implementation of network hardware and software. 
    • Performs routine day-to-day HIS processes that include regular monitoring of system parameters and network security, installation, and configuration of system hardware, and providing end-user support as needed.
    • Demonstrates ongoing performance improvements aimed at operational efficiencies, process improvements and financial outcomes.
    Maintains up-to-date knowledge of procedures and interpretations of all related federal, state & JCAHO laws and regulations.
  • 7 Days Ago

A
Network Security Analyst
  • Advocate Aurora Health
  • Atlanta, GA FULL_TIME
  • Duration: 16 months Job Description:Responsibilities:Implement and support Cisco ASA FirewallsUnderstanding of industrial control systems and protection with a OT firewallTroubleshooting skills, fault...
  • 24 Days Ago

E
Network Security Analyst (Hybrid)
  • External
  • Duluth, GA FULL_TIME
  • Responsibilities: Assists with the administration of the Information Security Program. Assists with the administration of the Incident Response Program, IS Risk Assessment Program, and IS Internal Con...
  • 1 Month Ago

T
Security Infrastructure Analyst V
  • Total System Services LLC
  • Columbus, GA FULL_TIME
  • Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwid...
  • 12 Days Ago

S
Information Security Analyst
  • Savannah-Chatham County Public School System
  • Savannah, GA FULL_TIME
  • PRIMARY FUNCTION: The Information Security Analyst will be responsible for monitoring and protecting district information on cloud-based and onsite systems from data breaches and cyber-attacks. REPORT...
  • 9 Days Ago

N
Computer Network Defense Analyst - Entry to Expert Level (MD, GA, TX, HI)
  • National Security Agency
  • Fort Eisenhower, GA FULL_TIME
  • Computer Network Defense Analyst - Entry to Expert Level (MD, GA, TX, HI)Fort Eisenhower, GA || NSA/CSS Hawaii Kunia, HI || Fort George G. Meade Complex, MD || NSA/CSS Texas, San Antonio TX, TXPay Pla...
  • 1 Month Ago

G
Security Management Analyst
  • Govcio LLC
  • Rock Island, IL
  • Overview: GovCIO is currently hiring for a Security Management Analyst in Rock Island, IL. Responsibilities: • Assist in...
  • 4/20/2024 12:00:00 AM

G
Property Administrator_TS/SCI with Polygraph
  • General Dynamics Information Technology
  • Chantilly, VA
  • Apply your expertise to advance the mission and optimize our business strategy as a Property Administrator Associate at ...
  • 4/20/2024 12:00:00 AM

G
Property Administrator _TS/SCI with Polygraph
  • General Dynamics Information Technology
  • Chantilly, VA
  • Apply your expertise to advance the mission and optimize our business strategy as a Property Administrator Associate at ...
  • 4/20/2024 12:00:00 AM

G
IA/Cyber Security Engineer
  • General Dynamics Information Technology
  • Fort Huachuca, AZ
  • Information Security Analyst Senior Transform technology into opportunity as an Information Security Analyst Senior with...
  • 4/20/2024 12:00:00 AM

G
Property Administrator_TS/SCI with Polygraph
  • General Dynamics Information Technology
  • Chantilly, VA
  • Apply your expertise to advance the mission and optimize our business strategy as a Property Administrator at GDIT. Here...
  • 4/20/2024 12:00:00 AM

C
Network Security Analyst
  • California State University System
  • Sacramento, CA
  • Our commitment is more than simply ensuring that our campus is free from bias and discrimination, but is one devoted to ...
  • 4/19/2024 12:00:00 AM

S
Network Security Analyst/ Auditor
  • Sri Tech Solutions Inc.
  • Phoenix, AZ
  • Job Title : Network Security Analyst/ Auditor Location: Phoenix, AZ / New York / Sunrise, FL / Palo Alto, CA (Need Local...
  • 4/16/2024 12:00:00 AM

R
Network Security Analyst
  • Russell Tobin & Associates
  • Dallas, TX
  • What are we looking for in our Network Security Analyst? JOB TITLE: Network Security Analyst Rate - $60 to $70/hr on w2 ...
  • 4/15/2024 12:00:00 AM

Georgia is a state in the Southeastern United States.Beginning from the Atlantic Ocean, the state's eastern border with South Carolina runs up the Savannah River, northwest to its origin at the confluence of the Tugaloo and Seneca Rivers. It then continues up the Tugaloo (originally Tugalo) and into the Chattooga River, its most significant tributary. These bounds were decided in the 1797 Treaty of Beaufort, and tested in the U.S. Supreme Court in the two Georgia v. South Carolina cases in 1923 and 1989. The border then takes a sharp turn around the tip of Rabun County, at latitude 35°N, thou...
Source: Wikipedia (as of 04/17/2019). Read more from Wikipedia
Income Estimation for Network Security System Analyst jobs
$85,077 to $112,188