Loading...

Easy Apply

Please enter a valid email.
Please enter a valid phone number.
Please select a valid country.
Please provide a resume.
You must review and agree before submitting.
NCDHHS- PSO IT Security Specialist
NC DHHS - Privacy and Security Office (PSO) requiring services of an Electronic Health Record System  IT Security lead to assist DSOHF. 

The EHR Security Coordinator is responsible for overseeing and ensuring the security of the organization's Electronic Health Record (EHR) system. This role involves managing access controls, conducting security audits, developing security policies, and ensuring compliance with healthcare regulations such as HIPAA and HITECH. The EHR Security Coordinator will work closely with IT, clinical, and compliance teams to secure patient data and protect the integrity of the EHR system.

Key Responsibilities:

Security Management & Compliance:

· Ensure the EHR system is secure and compliant with federal, state, and organizational security policies, including HIPAA, HITECH, and other applicable regulations.

· Monitor and enforce the appropriate use of EHR access controls, ensuring that users have the correct level of access based on their roles.

· Conduct regular security audits of the EHR system, identifying and mitigating risks or vulnerabilities.

· Develop and maintain security policies, procedures, and guidelines specific to the EHR environment.

· Coordinate with the stakeholders to implement and maintain security tools, such as firewalls, intrusion detection/prevention systems, and encryption mechanisms, as applicable to the EHR system.

Access Controls & User Management:

· Oversee user provisioning and de-provisioning, ensuring appropriate access to the system for all employees and contractors.

· Manage and audit role-based access controls (RBAC) for the system, ensuring that users have the correct level of access for their duties.

· Ensure that system logs and user access records are maintained for auditing purposes, and work with internal audit teams to ensure compliance.

Incident Response & Risk Management:

· Respond to and investigate security incidents related to the EHR system, ensuring timely resolution and proper reporting to relevant stakeholders.

· Perform risk assessments on new modules or integrations within the EHR, identifying potential security vulnerabilities and developing mitigation strategies.

· Coordinate with clinical, IT, and legal teams on breach notification processes in compliance with regulatory requirements.

Collaboration & Coordination:

· Collaborate with the EHR implementation and optimization teams to ensure that security measures are integrated into the deployment of new features, updates, and third-party applications.

· Work closely with other members of the IT security team to ensure alignment between EHR security and overall organizational cybersecurity strategies.

· Participate in governance and compliance meetings, offering insights and reports on EHR security.

Continuous Improvement:

· Stay informed about emerging security threats, technologies, and best practices related to EHR systems.

· Recommend improvements and optimizations to the EHR security environment based on industry trends and emerging threats.

Qualifications:

Education:

· Bachelor’s degree in information technology, Computer Science, Cybersecurity, or a related field. Relevant work experience may substitute for formal education.

· Security Certifications (e.g., CISSP, CISM, HCISPP) are highly desirable.

Experience:

· 3-5 years of experience in IT security, preferably within the healthcare industry.

· Prior experience with EHR systems is preferred.

· Experience with HIPAA compliance, healthcare IT security audits, and risk management.

· Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems.

Skills:

· Strong understanding of EHR systems.

· Proficient in healthcare regulations and standards, including HIPAA, HITECH, and meaningful use.

· Excellent problem-solving and analytical skills.

· Strong communication skills, capable of working across departments and with clinical teams.

· Ability to manage security incidents and respond to them efficiently.

· Familiarity with healthcare IT infrastructure, including networking, firewalls, and database security.

---

Working Conditions:

· May require occasional travel to different healthcare facilities within the organization.

· On-call availability for security incidents.



Required/Desired Skills


SkillRequired /DesiredAmountof Experience
Ability to manage security incidents and respond to them efficiently.Required7Years
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.Required7Years
5-7 years of experience in IT security, preferably within the healthcare industry.Required7Years
Experience updating privacy and security policies based on gaps found through an assessment process.Required7Years
Experience Performing risk assessments based on NIST 800-53 Rev 4. HIPAA,SSA and IRS Pub 1075. Required7Years
Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems.Required7Years
Proficient in healthcare regulations and standards, including HIPAA, HITECH, and meaningful use.Required7Years
Excellent problem-solving and analytical skills.Required7Years
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel Required7Years
Familiarity with healthcare IT infrastructure, including networking, firewalls, and database security.Required7Years
Strong communication skills, capable of working across departments and with clinical teams.Required7Years

Questions


No.Question
Question1Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question2All work must be completed on site at the client's discretion. Do you accept this requirement?
Question3Please list candidate's email address HERE that will be used when submitting E-RTR.
Question4Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment.
Question5Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement?
Question6Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement?
Question7Candidates submitted above the bill rate of - may not be considered. Do you accept this requirement?
Question8Please confirm you have thoroughly validated, and attest to the accuracy of, the credentials listed throughout this candidate’s VectorVMS profile and resume pursuant to Section 5.2.5 of ITS-009440. Do you confirm?