Manager, IT Secuirty at OptumCare

OptumCare

US, United States of America
October 15, 2020
Full-time
Software Engineering
Apply You will be redirected to OptumCare's preferred application process.

Manager, IT Secuirty

The Manager of IT Security provides leadership in support of Information Security programs to help maintain the confidentiality, integrity and availability of the organizationrsquos critical technology infrastructure and information assets. This position leads and supports a number of on-going functions associated with information classification, security vulnerability assessment, security event monitoring, incident response, security and availability metrics, awareness training, risk analysis, compliance audit support, appropriate use monitoring, computer forensics, business impact analysis and disaster recovery planning. The Manager of IT Security requires subject matter knowledge across all information security domains as well have a strong understanding of service management. This position must stay abreast of latest technical developments to ensure service levels proactively meet or exceed corporate and division requirements and service levels with key stakeholders. This position requires strong people management skills, personal drive, and the ability to see strategy through to execution. Strong written, verbal, and presentation skills are essential. Essential Functions.

Responsibilities

Understand business priorities and activities at Optum Care and subsidiaries. Maintain current knowledge of applicable regulatory and compliance issues related to Information Security. Based on this knowledge, plan, develop, document, maintain and monitor progress of Information Security Program components consistent with applicable regulatory and compliance requirements. Communicate policies, standards and procedures to manage security functions relative to information technology systems (including systems under development), networks, applications, and voice and data communications that are consistent with applicable regulatory and compliance requirements. Understand the threat landscape and attack trends as they relate to intelligence gathering, dissemination and defense coordination. Manage IT security operations including vulnerability management, security event management, incident response, security awareness, access hardening and regulatory compliance. Report business-relevant metrics to measure the efficiency and effectiveness of the Information Security Program, facilitate appropriate resource allocation and increase the maturity of the security program Provides clear direction to achieve goals, creating an environment that fosters team commitment and employee engagement. Establishes practices, policies and operating procedures and ensures alignment to business objectives and strategy. Maintains the perseverance to drive and sustain continuous improvement, while being resilient and flexible, and inspiring and motivating the team. Understands effective communication across all levels of the organization with the appropriate message, the right tone and the appropriate level of impact. Candidate is able to make the complex seem less complex, is a consensus builder and brings people and teams together. Builds strong relationship with IT operational leaders to ensure connectivity to the business. Creates a work environment in which people are able to perform to the best of their abilities. Recognizes talent and maximizes potential in others. Holds self and team accountable for technical abilities, productive results and leadership attributes of the organization. Recognizes problems and is able to make recommendationsdecisions on the best course of action to remediate. Resourceful at coming up with solutions using existing or available resources based on knowledge of the organization and level of execution effort Translates initiatives into actions through a thoughtful, organized and well-planned approach. Establishes measurement criteria and systems to track daily processes, implementation of new initiatives and value creation. Secondary Functions Perform other relevant job duties as assigned. Job Scope Job consists of recurring work situations with occasional variations from the norm. Job involves a moderate degree of complexity. Incumbent is an individual contributor and is responsible for establishing practices and procedures. Duties are performed independently with minimal supervision and work is checked or verified sometimes visually andor by results. Decisions are made within established departmental guidelines. Position has moderate visibility due to potentially impacting project timelines operations. Errors in judgment or work performance could result in data loss impacting patients and company reputation. Interpersonal Contacts Contacts are normally made with others both inside and outside the organization. Internal contacts may include the IT security team, IT operations team, IT business leadership and all teammates. External contacts may include vendors, consultants and contractors. Interactions tend to focus on information exchange, problem solving, explanation, discussion and interpretations. Interactions regularly contain confidentialsensitive information. Incumbent occasionally initiates contacts on hisher own with 70 being by phone or e-mail and the remainder via face-to-face interaction. Supervisory Responsibility Responsible for personnel management, performance reviews, competency development, and coaching of IT security team. Specific Job Skills Must have experiences and capabilities bull Proven Leadership Management abilities bull Mastery of all IT security technical domains bull Understanding of IT operations and service management bull Thorough knowledge of HIPAA security privacy requirements bull Strong analytical, communication, leadership and relationship skills bull Ability and desire to thrive in a fast-paced, team-oriented environment bull Strong attention to detail and organizational skills.

Education

Bachelor of Computer Science or similar college degree Security certifications such as CISSP or GIAC required.

Experience

5 years IT operations experience 5 years IT security experience 3 years management experience Job Conditions Job requires hours that may occasionally exceed 8 hours per day andor 40 hours per week during times of peak activity. Evening meetings andor weekend work occasionally required to collaborate with people in other time zones and to ensure timely project completion. Some job pressure exists in the balancing of several projects with conflicting and sometimes changing deadlines. The ability to sit for extended periods and to bend, kneel, and stoop. Ability to operate telephones and computer hardware and software, including keyboard and 10-key. Physical capability to occasionally lift up to 30 pounds.

Apply You will be redirected to OptumCare's preferred application process.
Job Expires: November 14, 2020

More ICYMI Jobs



Uh oh! Something went wrong. Please try again.
We were unable to find any more job. Have you tried changing your search keywords?

Be at home with your family

Get help finding work-from-home

Your Children Will Be Happier

Stop parenting from the office

Flexible Careers - No Commute

Is your job putting you at risk?

Work from the safety of your own home

Cancel the Commute & Save Hours per Day