Job Actions

Job Information

Associate Product Specialist - Epic Security
Category: Other
  • Your pay will be discussed at your interview

Job code: lhw-e0-90672726

Company Profile

Vanderbilt University Medical Center

Contact Company

Local Information

Laugh while you Look

Sponsored Ads


  Job posted:   Thu Jun 7, 2018
  Distance to work:   ? miles
  10 Views, 0 Applications  
Associate Product Specialist - Epic Security
This is
a full-time position with Vanderbilt University Medical Center (VUMC) and
includes a comprehensive benefits package, challenge and a highly collaborative
team. We are in the midst of a major Epic implementation and are poised to fill
this role in the near term.

For immediate
consideration, your skills and experience should include:

Build and implementation
of Security files within all Epic environments and maintain policies and procedures
for access to all Epic environments

Creating all new users
in Epic including employees, contractors, students, and external

Build and maintain all
other EMP records including Templates and Background Users

Coordinating with the
Training and Application teams to make sure the required training has been
completed and the user has passed their proficiency exam before access is
changed or granted

Experience working with
Application Teams when they need to determine the implications of a desired
change (whether it will affect more than the intended user group)

Build and maintain
Security Master Files

Data Courier Security
INIs from POC to other environments as requested by application groups if
appropriately approved and coordinated

Consult with Users &
Security workgroup members to determine best and appropriate way to provided
needed access to users throughout the enterprise.

Gatekeeper to insure
that Epic system access is limited to only those people who are approved to
have it

Create documentation to
share with other Users & Security Coordinator team members for ongoing

Preferred Certification:
Epic Security Coordinator (Updated NVT)

**Key Functions andExpected Performances:**

1. **Core Accountabilities:**

a. Organizational Impact:Executes job responsibilities with the understanding of how output wouldaffect and impact other areas related to own job area/team withoccasional guidance.

b. Problem Solving/Complexity ofWork: Analyzes moderately complex problems using technical experience andjudgement

c. Breadth of Knowledge: Hasexpanded knowledge gained through experience within a professional area

d. Team Interaction: Providesinformal guidance and support to team members

2. **Key Responsibilities:**

a. Conducts computerinvestigations.

b. Responds and/or mitigatessecurity breaches and attacks to the infrastructure.

c. Conducts vulnerability andthreat analysis for the environment.

3. **Core Capabilities: SupportingColleagues**

a. Develops Self and Others:Invests time, energy and enthusiasm in developing self/others to helpimprove performance and gain knowledge in new areas

b. Builds and MaintainsRelationships: Maintains regular contact with key colleagues andstakeholders using formal and informal opportunities to expand andstrengthen relationships

c. Communicates Effectively:Recognizes group interactions and modifies one's own communication styleto suit different situations and audiences

4. **Core Capabilities: DeliveringExcellent Services**

a. Serves Others with Compassion:Seeks to understand current and future needs of relevant stakeholders andcustomizes services to better address them

b. Solves Complex Problems:Approaches problems from different angles; Identifies new possibilitiesto interpret opportunities and develop concrete solutions

c. Offers Meaningful Advice andSupport: Provides ongoing support and coaching in a constructive manner toincrease employees' effectiveness

5. **Core Capabilities: EnsuringHigh Quality**

a. Performs excellent work:Engages regularly in formal and informal dialogue about quality; directlyaddresses quality issues promptly

b. Ensures continuousimprovement: Applies various learning experiences by looking beyondsymptoms to uncover underlying causes of problems and identifies ways toresolve them

c. Fulfills safety and regulatoryrequirements: Understands all aspects of providing a safe environment andperforms routine safety checks to prevent safety hazards from occurring

6. **Core Capabilities: ManagingResources Effectively**

a. Demonstrates Accountability:Demonstrates a sense of ownership, focusing on and driving criticalissues to closure

b. Stewards OrganizationalResources: Applies understanding of the departmental work to effectivelymanage resources for a department/area

c. Makes Data Driven Decisions:Demonstrates strong understanding of the information or data to identifyand elevate opportunities

7. **Core Capabilities: FosteringInnovation**

a. Generates New Ideas:Proactively identifies new ideas/opportunities from multiple sources ormethods to improve processes beyond conventional approaches

b. Applies Technology:Demonstrates an enthusiasm for learning new technologies, tools, andprocedures to address short-term challenges

c. Adapts to Change: Viewsdifficult situations and/or problems as opportunities for improvement;actively embraces change instead of emphasizing negative elements

8. **Technical Capabilities:**

a. Incident Response:Demonstrates the ability to respond quickly to reports from individuals.Takes immediate action to stop an incident from continuing or recurring.Determines whether an incident should be handled locally or reported tothe IT Security Response Team. Works with the IT support staff to repaira system, restore service, and preserve evidence of the incident. Handlessensitive and other critical responses in a professional manner. Evaluatesand documents investigation findings after resolving an incident.

b. Vulnerability Assessments:Demonstrates the ability to successfully review basic Internetconnections and internal networks to identify standard hacker/crackerthreats. Able to review the configuration of server and major networkapplications to identify configuration errors and other problems thatweaken organizational systems and increase their likelihood of misuse.Has conducted an assessment of at least one of the following: [1] accesscontrols, governing access to applications and files, [2] passwordcontrols, determining permissible choice of passwords and governing therequirement to change passwords, [3] connectivity controls [e.g., openports/ enabled protocols] influencing permissible communications to andfrom a computer system, [4] inappropriate files [including viruses,worms, trojan horses, bootleg software, music files, inappropriate imagefiles], and [5] unpatched softw

c. Malware Analysis: Possessessufficient fundamental proficiency to successfully demonstrate MalwareAnalysis in practical applications of moderate difficulty. Has determinedthe behavior and purpose of a simple malware threat, and eliminated itfrom the company's computers. Familiar with Dynamic Analysis, theanalysis of software during its execution on a computer or in an virtualmachine, and Static Analysis, the method to look at the component withoutany execution on the component itself. Has used basic Malware Analysistools and products.

d. Network Forensics: Possessessufficient fundamental proficiency to successfully demonstrate NetworkForensics in practical applications of moderate difficulty.

e. Anomaly Detection: Possessessufficient fundamental proficiency to successfully demonstrate AnomalyDetection practices in practical applications of moderate difficulty. Hasa basic understanding of network behavior analysis techniques and tools.Capable of using Intrusion Detection Systems software.

Bachelor's Degree (or equivalent experience) and 1 year relevant industry

**Physical Requirements/Strengths needed & Physical Demands:**

+ Sedentary category requiring exertion up to 10 lbs. of force occasionally and uses negligible amounts of force to move objects. Sedentary work involves sitting most of the time.


+ Occasional: Standing: Remaining on one's feet without moving.

+ Occasional: Walking: Moving about on foot.

+ Occasional: Lifting under 35 lbs: Raising and lowering objects under 35 lbs from one level to another

+ Occasional: Carrying under 35 lbs: Transporting an object holding in hands, arms or shoulders, with help of coworkers or assistive device.

+ Occasional: Push/Pull: Exerting force to move objects away from or toward.

+ Occasional: Bending/Stooping: Trunk bending downward and forward by bending spine at waist requiring full use of lower extremities and back muscles

+ Occasional: Reaching above shoulders: Extending arms in any direction above shoulders.

+ Occasional: Handling: Seizing, holding, grasping, turning or otherwise working with hand or hands.

+ Frequent: Sitting: Remaining in seated position

+ Frequent: Reaching below shoulders: Extending arms in any direction below shoulders.

+ Frequent: Bimanual Dexterity: Requiring the use of both hands.


+ Continuous: Communication: Expressing or exchanging written/verbal/electronic information.

+ Continuous: Auditory: Perceiving the variances of sounds, tones and pitches and able to focus on single source of auditory information

+ Continuous: Vision: Clarity of near vision at 20 inches or less and far vision at 20 feet or more with depth perception, peripheral vision, color vision.

+ Continuous: Smell: Ability to detect and identify odors.

**Environmental Conditions**

**Job** _Information Technology_

**Organization:** _HealthIT eStar Security 108771_

**Title:** _Associate Product Specialist - Epic Security_

**Location:** _TN-Nashville-3401 West End Ave_

**Requisition ID:** _1803688_

More Information »