Key Responsibilities:
Security Management & Compliance:
· Ensure the EHR system is secure and compliant with federal, state, and organizational security policies, including HIPAA, HITECH, and other applicable regulations.
· Monitor and enforce the appropriate use of EHR access controls, ensuring that users have the correct level of access based on their roles.
· Conduct regular security audits of the EHR system, identifying and mitigating risks or vulnerabilities.
· Develop and maintain security policies, procedures, and guidelines specific to the EHR environment.
· Coordinate with the stakeholders to implement and maintain security tools, such as firewalls, intrusion detection/prevention systems, and encryption mechanisms, as applicable to the EHR system.
Access Controls & User Management:
· Oversee user provisioning and de-provisioning, ensuring appropriate access to the system for all employees and contractors.
· Manage and audit role-based access controls (RBAC) for the system, ensuring that users have the correct level of access for their duties.
· Ensure that system logs and user access records are maintained for auditing purposes, and work with internal audit teams to ensure compliance.
Incident Response & Risk Management:
· Respond to and investigate security incidents related to the EHR system, ensuring timely resolution and proper reporting to relevant stakeholders.
· Perform risk assessments on new modules or integrations within the EHR, identifying potential security vulnerabilities and developing mitigation strategies.
· Coordinate with clinical, IT, and legal teams on breach notification processes in compliance with regulatory requirements.
Collaboration & Coordination:
· Collaborate with the EHR implementation and optimization teams to ensure that security measures are integrated into the deployment of new features, updates, and third-party applications.
· Work closely with other members of the IT security team to ensure alignment between EHR security and overall organizational cybersecurity strategies.
· Participate in governance and compliance meetings, offering insights and reports on EHR security.
Continuous Improvement:
· Stay informed about emerging security threats, technologies, and best practices related to EHR systems.
· Recommend improvements and optimizations to the EHR security environment based on industry trends and emerging threats.
Qualifications:
Education:
· Bachelor’s degree in information technology, Computer Science, Cybersecurity, or a related field. Relevant work experience may substitute for formal education.
· Security Certifications (e.g., CISSP, CISM, HCISPP) are highly desirable.
Experience:
· 3-5 years of experience in IT security, preferably within the healthcare industry.
· Prior experience with EHR systems is preferred.
· Experience with HIPAA compliance, healthcare IT security audits, and risk management.
· Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems.
Skills:
· Strong understanding of EHR systems.
· Proficient in healthcare regulations and standards, including HIPAA, HITECH, and meaningful use.
· Excellent problem-solving and analytical skills.
· Strong communication skills, capable of working across departments and with clinical teams.
· Ability to manage security incidents and respond to them efficiently.
· Familiarity with healthcare IT infrastructure, including networking, firewalls, and database security.
---
Working Conditions:
· May require occasional travel to different healthcare facilities within the organization.
· On-call availability for security incidents.
Skill | Required /Desired | Amount | of Experience |
---|---|---|---|
Ability to manage security incidents and respond to them efficiently. | Required | 7 | Years |
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies. | Required | 7 | Years |
5-7 years of experience in IT security, preferably within the healthcare industry. | Required | 7 | Years |
Experience updating privacy and security policies based on gaps found through an assessment process. | Required | 7 | Years |
Experience Performing risk assessments based on NIST 800-53 Rev 4. HIPAA,SSA and IRS Pub 1075. | Required | 7 | Years |
Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems. | Required | 7 | Years |
Proficient in healthcare regulations and standards, including HIPAA, HITECH, and meaningful use. | Required | 7 | Years |
Excellent problem-solving and analytical skills. | Required | 7 | Years |
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel | Required | 7 | Years |
Familiarity with healthcare IT infrastructure, including networking, firewalls, and database security. | Required | 7 | Years |
Strong communication skills, capable of working across departments and with clinical teams. | Required | 7 | Years |
No. | Question |
---|---|
Question1 | Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement? |
Question2 | All work must be completed on site at the client's discretion. Do you accept this requirement? |
Question3 | Please list candidate's email address HERE that will be used when submitting E-RTR. |
Question4 | Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment. |
Question5 | Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement? |
Question6 | Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement? |
Question7 | Candidates submitted above the bill rate of - may not be considered. Do you accept this requirement? |
Question8 | Please confirm you have thoroughly validated, and attest to the accuracy of, the credentials listed throughout this candidate’s VectorVMS profile and resume pursuant to Section 5.2.5 of ITS-009440. Do you confirm? |