[Close] 

IT Security Analyst

Job Summary: Reporting to the Manager of Systems and Operations, the IT Security Analyst has primary responsibility for securing the end-user desktop computing environment at Emerson Hospital. This includes configuring, monitoring and analyzing security tools, troubleshooting hardware, local applications, operating systems, and other IT owned devices used by hospital staff. The IT Security Analyst works closely with the Information Security Office, the IT Server, Network and Application teams to plan projects and coordination the roll out of changes affection end users and to resolve complex issues impaction the environment. Also mentors and provides technical leadership for other Service Desk personnel. Minimum Qualifications: Education: Bachelor's degree in Computer Science, Health Care, Electrical Engineering, Nursing, Information Systems or related specialty strongly preferred, or equivalent experience/ training. Experience: Minimum of five (5) years of experience providing end user support in a Helpdesk or Call Center environment. Awareness of cybersecurity and privacy principles, cyberthreats, vulnerabilities, and experience in their remediation. Licensure and/or Certification: A valid Massachusetts Driver s License may be required. Skills: Excellent customer service skills. Must be able to read, write, and communicate in English. Computer skills required. Ability to maintain confidential information. Ability to troubleshoot and resolve or escalate computer problems. Ability to interact positively with medical staff under difficult conditions. Expert knowledge of Microsoft operating systems and PC hardware. Self-motivated and eager to learn new technologies, in a fast-paced environment. Ability to interact favorably with people, and work effectively as a team member 16765
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Research Associate - Information Security Anal...
Somerville, MA Brigham and Women's Hospital
Research Information Security Analyst II / 40 ...
Somerville, MA Brigham and Women's Hospital
Cloud Security Analyst IV
Boston, MA Children's Hospital Boston
app/systems Analyst I (IS Security)
Worcester, MA UMass Memorial Health Care
Client Service Analyst, ITS-Service Desk
Boston, MA Boston Medical Center
Senior Analyst, Medicaid ACO
Needham, MA Steward Health Care