University of Texas at Austin
Austin, United States
Healthcare & Medical
Permanent | Full Time
Job Posting Title:Enterprise IT Cybersecurity Architect, Information Technology, Dell Medical School
Hiring Department:Dell Medical School
Position Open To:All Applicants
Weekly Scheduled Hours:40
Earliest Start Date:Immediately
Position Duration:Expected to Continue
Under the direction of the Manager of the Enterprise IT Security and Operations, and reporting through the Office of the CIO; the Enterprise Cybersecurity Architect is responsible for assisting with the design of a security system or major components of a security system at Dell Medical School (Dell Med) and UT Health Austin Clinical Enterprise.
Contributes to the development and execution of security architecture and engineering, supporting enterprise initiatives. Drives efforts to validate that strategic direction is in alignment with business operations strategy. Conducts business level security architecture assessments to evaluate existing security program(s) and cloud application architecture. Identifies weaknesses and makes appropriate recommendations. Produces security metrics reporting the state of application security programs and performance against emerging threats. Uses network security technologies, frameworks (NIST, ISO, HIPAA) and solutions to design information security architectures throughout the enterprise, and use application frameworks, security concepts, and strategies that align with network and security industry best practices, in addition to supporting mission and values of Dell Med.
Collaborates with the Information Technology department and wider business operations to address information security and compliance challenges, promote security awareness, and engage in a wide variety of information security-related projects and initiatives. Collaborates with key stakeholders and team members, to assess current application security environments with regulatory and industry requirements. Informs areas of noncompliance/gaps to be remediated for all application security requirements, including; PCI-DSS, GDPR and other federal and state regulations as required. Stays current with security technologies such as cloud platform security, dev-ops security, identity and access products, endpoint security products, network security technology and mobile security technologies. Evaluates and makes recommendations based on business value. Functions as an application security spokesperson translating security concepts into language that is meaningful to varying audiences, including Clinical Enterprise, Research and Academic leaders. Helps to define guidelines, best practices, writing policies/standards and driving adoption of new information security architectural designs. Delivers security guidance and conducts regular security consultancies for the business.
Integrates new and existing security tools, standards, and processes into the development life cycle, including static analysis and runtime testing tools. Designs, evaluates, and documents remediation processes and in accomplishing process reviews and improvements. Defines, implements, and maintains corporate security policies. Manages and improves Information Technology Infrastructure Library (ITIL)-based processes used to support security solutions: Incident Management, Requests Fulfilment, Change Management, and Problem Management.
Serves as an expert advisor to the Dell Medical School and UT Health Austin leadership teams on current organizational security and system availability / resiliency posture and risks. Displays expertise and technical ownership of critical areas of operational security including privileged access management, asset & vulnerability management, intrusion detection & prevention, and security analytics & visibility.
Partners closely with Clinical Enterprise, Research, Academic and Community Impact leadership to ensure close alignment and support on any technical, security, or privacy aspects of contracts and needs. This includes conducting research and providing updates on industry trends, standards and practices. Additionally, this includes maintaining a current understanding of the cyber threat landscape and building and maintaining a system resiliency enterprise function through training of people, building of processes, and implementation of new technologies.
As projects arise and business grows, may lead team efforts, working to design and build new security applications or optimize components of existing security applications and will partner closely with UT Austin and UT System teams for proactive planning and incident response.
Other related duties as assigned.
Bachelor's degree in Computer Science, Information Systems or other related field. Eight years of progressive experience in Information Technology and/or Security; minimum of three years of Healthcare IT experience. Security+ certification. Demonstrated strong understanding of information security across all security domains and the relationship between threats, vulnerabilities, and information value in the context of risk management. Understands and applies principles, procedures, requirements, regulations, and policies related to specialized expertise: Technical knowledge of different types of networking, applications and operating systems. HIPAA and PCI DSS regulatory compliance knowledge. Strong leadership and persuasion skills. Strong attention to detail. Excellent interpersonal skills and professional demeanor. Excellent verbal and written communication skills. The Dell Medical School is especially interested in qualified candidates who can contribute to diversity and excellence within the learning health system. At the Dell Medical School we strive to create a vital, inclusive health ecosystem. To ensure alignment, we follow these fundamental values: Relevant education and experience may be substituted as appropriate.
CISSP Certification. Strong technical knowledge of various networking, applications and operating experience. Proven understanding of security for structured databases and unstructured data, such as access controls, encryption, and monitoring. Must collaborate with colleagues at all levels and deliver results in a timely fashion with minimal direction. Proven working knowledge of technology used in modern data center environments, such as virtualization, containerization, cloud, high availability, business continuity and disaster recovery. Established understanding of Software Development Lifecycle (SDLC) and Infrastructure Development Lifecycle (IDLC) processes. Proven ability to work with compliance frameworks and requirements such as PCI, HIPAA, GDPR, and SOX.
$75,000+ depending on qualifications
May work around standard office conditions.
Repetitive use of a keyboard at a workstation.
3 work references with their contact information; at least one reference should be from a supervisor
Letter of interest
Important for applicants who are NOT current university employees or contingent workers: You will be prompted to submit your resume the first time you apply, then you will be provided an option to upload a new Resume for subsequent applications. Any additional Required Materials (letter of interest, references, etc.) will be uploaded in the Application Questions section; you will be able to multi-select additional files. Before submitting your online job application, ensure thatALLRequired Materials have been uploaded. Once your job application has been submitted, you cannot make changes.
Important for Current university employees and contingent workers: As a current university employee or contingent worker, you MUST apply within Workday by searching for Find UT Jobs. If you are a current University employee, log-in to Workday, navigate to your Worker Profile, click the Career link in the left hand navigation menu and then update the sections in your Professional Profile before you apply. This information will be pulled in to your application. The application is one page and you will be prompted to upload your resume. In addition, you must respond to the application questionspresented to upload any additional Required Materials (letter of interest, references, etc.) that were noted above.
Employment Eligibility:Regular staff who have been employed in their current position for the last six continuous months are eligible for openings being recruited for through University-Wide or Open Recruiting, to include both promotional opportunities and lateral transfers. Staff who are promotion/transfer eligible may apply for positions without supervisor approval.
Retirement Plan Eligibility:The retirement plan for this position is Teacher Retirement System of Texas (TRS), subject to the position being at least 20 hours per week and at least 135 days in length.
A criminal history background check will be required for finalist(s) under consideration for this position.
Equal Opportunity Employer:
The University of Texas at Austin, as an equal opportunity/affirmative action employer,complies with all applicable federal and state laws regarding nondiscrimination and affirmative action. The University is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, or veteran status in employment, educational programs and activities, and admissions.
The University of Texas at Austin will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information.
Employment Eligibility Verification:
If hired, you will be required to complete the federal Employment Eligibility Verification I-9 form. You will be required to present acceptable and original documents to prove your identity and authorization to work in the United States. Documents need to be presented no later than the third day of employment. Failure to do so will result in loss of employment at the university.
The University of Texas at Austin use E-Verify to check the work authorization of all new hires effective May 2015. The university's company ID number for purposes of E-Verify is 854197. For more information about E-Verify, please see the following:
Employees may be required to report violations of law under Title IX and the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act (Clery Act). If this position is identified a Campus Security Authority (Clery Act), you will be notified and provided resources for reporting. Responsible employees under Title IX are defined and outlined in HOP-3031.
The Clery Act requires all prospective employees be notified of the availability of the Annual Security and Fire Safety report. You may access the most recent report here or obtain a copy at University Compliance Services, 1616 Guadalupe Street, UTA 2.206, Austin, Texas 78701.
Loading please wait...