Develop security artifacts to support the IA program to include System Security Plans (SSP), Security Assessment Reports (SAR), Risk Assessment Reports (RAR), Security Control Traceability Matrix (SCTM), Plan of Action and Milestones (POAM), System Design and Installation Procedures, System User Guides, Privileged User Guides, Security Test Procedures and other documents as needed.
December 26, 2019
Lead, plan and consult on information gathering sessions with data stewards and users to help them define business metric definitions and metadata that are complete and unambiguous.
January 25, 2020
Assists in the development, review and/or approval of internal audits, responses to internal and external citations, requests to FDA for variance, submission of SOPs for FDA review, and evaluation of non-conforming software applications as is relates to security and privacy.
January 28, 2020
Performs routine system security audits in all ERP environments to ensure all users are appropriately provisioned for their work function ad to ensure they are in accordance with the global versioning and release calendar.
February 01, 2020
Understand and articulates line of business data requirements and works alongside the IT Delivery team to define the corresponding solution design.
February 05, 2020
Demonstrated proficiency in the management of personal computing hardware and software, servers and storage, wide and local area networks and VOIP telecommunications hardware and software.
February 22, 2020
Supporting patient accounting and revenue cycle applications (Systems Support and Development Role) or interfaces (Interface Developer role) including installing upgrades, providing enhancements and problem management.
March 06, 2020
Requires extensive knowledge of IT concepts and principles, the theories and functions of computer systems and the principles, techniques of IT documentation, vocabulary and methodologies of a LAN-based computer shop, an understanding of the advantages and limitations of computer communication and information retrieval systems as management information tools.
March 18, 2020
Review vulnerability scan results at the operating system (OS) and application level and work with stakeholders to architect and implement mitigations.
April 20, 2020