Work at UH Advertisement

Title:
Information Technology (Security Admin)
Position Number:
0081590
Hiring Unit:
UH, School of Medicine, Office of Information Technology
Location:
Kaka'ako Campus
Date Posted:
February 24, 2017
Closing Date:
March 31, 2017
Band:
B
Full Time/Part Time:
Full Time
Temporary/Permanent:
Permanent
Funding:
General Funds

Other Conditions:
  • To begin approximately April/May 2017, subject to position clearance and availability of funds. Appointment is renewable dependent upon satisfactory performance. Start of employment is contingent upon attending and passing bio-security training and successfully obtaining Criminal Justice Information Services (CJIS) Federal Bureau of Investigation (FBI) clearance.
Duties and Responsibilities
  1. Develops and implements information security processes and procedures as per University of Hawaii, State of Hawaii, and Federal security policies; specifically compliance with the Health Information Portability and Accountability Act of 1996 (HIPAA).
  2. Establishes procedures that comply and enable users to perform sensitive data collection, storage, and analyses in a secure and efficient manner.
  3. Creates, updates, and maintains the security plan on a regular basis to protect its information systems and computing environment.
  4. Installs and manages hardware and software tools to proactively assess and provide continuous monitoring of information systems.
  5. Develops an incident response plan and implements plan as needed. Creates documentation and reports for systems modifications, as per HIPAA.
  6. Establishes and executes regularly scheduled information security audits. Develops, plans and executes security assessments, privacy impact assessments, and risk management assessments as per HIPAA policy and the security plan (cont.)
  7. that protect sensitive and regulated data. Document results and develops an ongoing plan to address deficiencies and deliver improvements.
  8. Oversees the work of consultants and/or subcontractors hired to assess the security plan and audit the information security system.
  9. Collaborate with other University departments to share information and learn their approaches to information security.
  10. Develops and implements an information security awareness training program and ad-hoc education for faculty, staff, and students.
  11. Documents and reports staff information security training records on a regular basis as part of the scheduled security assessments.
  12. Keeps abreast of and ensures compliance with Federal and State laws, and University policies, as applicable.
  13. Keeps abreast of changes in State and Federal laws, directives, policies and procedures, as well as trends/advances/practices in IT that affect its application in higher education instruction, research, administration or public service.
  14. Keeps current with trends and issues in the IT industry, including current technologies and prices.
  15. Represents JABSOM IT at local and national conferences; attends training/certification events, and maintains an informed knowledge base in the IT security area in support of meeting technical goals.
  16. Other duties as assigned
Minimum Qualifications
  1. Possession of a pertinent baccalaureate educational degree in computer science, management information systems, or related field from an accredited institution and 5 years of progressively responsible professional information technology experience with responsibilities for information technology security programs, of which 2 years of the experience must have been comparable in scope and complexity to the next lower payband in the University of Hawai'i broadband system; or equivalent education/training or experience.
  2. Considerable working knowledge of information technology security as demonstrated by the broad knowledge and understanding of the full range of pertinent standard and evolving information technology concepts, principles and methodology.
  3. Considerable working knowledge and understanding of the broad technology, systems, hardware and software associated with information technology security.
  4. Demonstrated ability to recognize a wide range of intricate problems, use reasoning and logic to determine accurate causes, and apply principles and practices to determine, evaluation, integrate, and implement practical and thorough solutions in an effective and timely manner.
  5. Demonstrated ability to interpret and present information and ideas clearly and accurately in writing, verbally and by preparation of reports and other materials.
  6. Demonstrated ability to establish and maintain effective working relationships with internal and external organizations, groups, team leaders and members, and individuals.
  7. For supervisory work, demonstrated ability to lead subordinates, manage work priorities and projects, and manage employee relations.
  8. Minimum of four (4) years of experience and strong knowledge of IT security measures such as intrusion detection, firewalls, two-factor authentication, security-event logging, incident response practices, (cont.)
  9. vulnerability scanning, risk management, encryption, networking, commercial and open-source operating systems, reporting, and documentation.
  10. Ability to develop and manage an information security program with regularly scheduled audits and continuous monitoring.
  11. Demonstrated ability and considerable working knowledge of project management and business analysis in support of technical operations with the ability to work cooperatively with management and business units to accomplish tasks.
  12. Demonstrated ability to recognize, comprehend and address technical issues with vendors and technology staff, develop a solution strategy and manage such issues to completion.
  13. Demonstrated ability to successfully manage to completion, complex, high risk, and high visibility information technology projects.
  14. Demonstrated ability and interpersonal skills necessary to communicate effectively to resolve internal client issues and requests and meet internal client’s expectations.
  15. Any equivalent combination of education and/or professional work experience which provides the required education, knowledge, skills and abilities as indicated.
Desirable Qualifications
  1. Prior work experience at a medical school, health sciences campus and/or higher education institution.
  2. Applicable certifications in IT security (e.g. CISSP, GIAC, Security+).
  3. Experience working with HIPAA compliance requirements.
  4. Experience with information security in an academic medicine environment.

To Apply:
Submit cover letter indicating how you satisfy the minimum and desirable qualifications, resume, UH Form 64A (attach resume), contact information (including e-mail addresses) of 3 professional references, official transcripts directly from the institution of highest educational level relevant to job sought (copies accepted, however, original is required upon hire) to the e-mail address below. Applications must be received by the closing date. Please note that incomplete applications will not be considered.
Inquiries:
  1. Vance Mizuba; 808-692-1116; vancecm@hawaii.edu

The University of Hawaiʻi is an equal opportunity/affirmative action institution and is committed to a policy of nondiscrimination on the basis of race, sex, gender identity and expression, age, religion, color, national origin, ancestry, citizenship, disability, genetic information, marital status, breastfeeding, income assignment for child support, arrest and court record (except as permissible under State law), sexual orientation, domestic or sexual violence victim status, national guard absence, or status as a covered veteran.

Employment is contingent on satisfying employment eligibility verification requirements of the Immigration Reform and Control Act of 1986; reference checks of previous employers; and for certain positions, criminal history record checks.

In accordance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, annual campus crime statistics for the University of Hawaii may be viewed at: http://ope.ed.gov/security/, or a paper copy may be obtained upon request from the respective UH Campus Security or Administrative Services Office.

In accordance with Article 10A of the unit 08 collective bargaining agreement, bargaining unit members receive priority consideration for APT job vacancies. As a result, external or non BU 08 applicants may not be considered for some APT vacancies. BU 08 members with re-employment rights or priority status are responsible for informing the hiring unit of their status.