Children's Hospital Colorado IT Security Analyst Associate - 60863 in Aurora, Colorado

Why Work at Children's....Children's Hospital Colorado has defined and delivered pediatric healthcareexcellence for more than 100 years. Founded in 1908, Children's Coloradois a leading pediatric network entirely devoted to the health and well beingof children. Continually recognized as one of the nation's outstandinghospitals by U.S. News & World Report, Children's Colorado is known bothfor its nationally and internationally recognized medical, research andeducation programs as well as the full spectrum of everyday care for kidsthroughout Colorado and surrounding states. With more than 1,000 healthcareprofessionals representing the full spectrum of pediatric specialties,Children's Colorado Network of Care includes its main campus, 16Children's Care Centers and more than 400 outreach clinics.A career at Children's Colorado will challenge you, inspire you, andmotivate you to make a difference in the life of a child.Additional InformationDepartment: Information SecurityHours per week: 40, eligible for benefitsShift: Weekdays Monday - Friday with operational on call responsibilities.Job OverviewThis position trains in assessing, planning, designing, enforcing andauditing of security policies and procedures to safeguard the integrity of andaccess to enterprise systems, files and data elements while performing entrylevel, routine tasks. Supports and assists with developing, monitoring,evaluating, maintaining and enforcing systems and procedures.ResponsibilitiesPopulation Specific CareNo direct patient care.Essential FunctionsAn employee in this position may be called upon to do any or all of thefollowing essential functions. These examples do not include all of thefunctions which the employee may be expected to perform.Trains in conducting vulnerability assessments and identifies potentialsystems and process vulnerabilities. Determines security infrastructurerequirements.Trains and assists with the development and implementation of securitypolicies, procedures and measures to prevent unauthorized access. Auditssecurity policies and procedures and identifies potential areas where existingdata security policies and procedures require change.Trains on performing security assessments and reviews networking initiativesfor security compliance.Assists with responding to alerts from information security tools andreports, investigates and resolves security incidents.Other InformationSCOPE AND LEVELGuidelines: Possesses knowledge of the fundamental concepts, practices andprocedures within a particular field of specialization. Gains experience onthe job and assists higher levels in executing duties and tasks.Complexity: Duties and tasks are typically routine and standardized, butmay be elevated depending on the role. Procedures, methods and techniques tocarry out work are generally, but not always, well defined. Resolves somequestions and problems, and escalates as needed.Decision Making: Has little to no discretion in making decisions withoutescalating to a higher level employee, supervisor and/or manager.Decisions and recommendations are limited to relating existing organizationalpolicies to specific cases. Issues that are not covered by guidelines or thatare without precedence are escalated.Communication: Communicates factual information relative to the organizationand/or own function generally with team members and peers only, but insome cases clients and/or the public. Uses little to no discretion orindependent judgment but rather communicates within the parameters of clearlydefined procedures and instructions.Supervision Received: Works under direct supervision and work product issubject to frequent inspection. May assist in orienting and training lowerlevel employees.QualificationsEDUCATION - Bachelor's degree is required.EXPERIENCE - No related experience is required.EQUIVALENCY - Combination of post-high school education, job relatedcertification and/or related experience equivalent to 4 years may beconsidered in lieu of minimum re