"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • VP, Cybersecurity/CISO - IT Administration - Full…

    Guthrie (Sayre, PA)



    Apply Now

    Position Summary:

    This position will be a member of the Information Services Leadership team. Working with senior management, the CISO (Chief Information Security Officer) will assess and coordinate the process to build a system‐wide information security strategy and vision. The CISO oversees the creation and maintenance of information security policy, leads security risk assessment efforts, and owns the health system awareness and training program. He/She also advises and collaborates on development of business continuity and disaster recovery plans, IT related audits, and governmental compliance practices in collaboration with The Guthrie Clinic’s (TGC) Office of Compliance & Audits. The CISO serves as the process owner of all assurance activities related to the availability, integrity and confidentiality of patient, business partners, employees and business information in compliance with the organization's information security policies. A key element of the cybersecurity role is working with executive management to determine acceptable levels of risk for the organization. The role requires knowledge of the health care provider business environment and ensures that information systems are maintained in a fully functional reliable and secure mode. They will manage, lead and mentor a team in all areas of technology from security, infrastructure, data warehouses, storage. virtualization mobile technology, cloud, networks, and telecommunications.

    Education, License & Cert:

    Bachelor’s Degree in Information Technology, Computer Science, Information Security or other related area. Advanced degree preferred.

    Experience:

    • Minimum of eight to 10 years of experience in a combination of risk management, information security and IT jobs. At least four must be in a senior leadership role. Employment history must demonstrate increasing levels of responsibility.

    • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk‐related concepts to technical and nontechnical audiences.

    • Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic environment. • Poise and ability to act calmly and competently in high‐pressure, high‐stress situations.

    • Must be a critical thinker, with strong problem‐solving skills.

    • Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes‐Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.

    • Familiarity with the Office of Civil Rights and their ePHI enforcement procedures is desirable. • Exhibit excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives.

    • Project management skills: financial/budget management and resource management.

    • Certifications in Microsoft/Cisco/VMware and Epic technologies preferred

    • ITIL or PMI Certification is preferred • Must have a strong hands‐on/technical knowledge of core Microsoft technologies including but not limited to Windows Servers, Active Directory, MS SQL and core Network/Cisco technologies like LAN/WAN, subnets, firewalls, VLAN's, and VPN using Cisco switches, routers and ASA's is required • Ability to lead and motivate cross‐functional, interdisciplinary teams to achieve tactical and strategic goals. • Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials, is desired. Certification is required in the first 12 months

    . • Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT, NIST and HITRUST.

    • Experience in the operation of a security operations center (SOC), as well as significant experience in the areas of incident response, digital forensics, and vulnerability management highly desired.

    • Demonstrated implementation of NIST or HITRUST Security Framework to move an organization from a Level 1 Maturity Scale to a Level 3 or greater • Experience with contract and vendor negotiations.

    • High level of personal integrity, as well as the ability to professionally handle confidential matters, and show an appropriate level of judgment and maturity.

    • High degree of initiative, dependable and ability to work with little supervision.

    • Some travel required to regional offices and hospitals.

    Essential Functions:

    The ideal candidate is a thought leader, a consensus builder, and an integrator of people and processes. While the CISO is the leader of the security program, he or she must also be able to coordinate disparate drivers, constraints, personalities while maintaining objectivity and a strong understanding that security is just one of the business's activities. It cannot be undertaken at the expense of the enterprise's ability to deliver on its goals and objectives. Design, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. He/she will be responsible for the maturation of a security program based on the HITRUST framework.

     

    1. Manage the enterprise's information security and infrastructure services consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations, external consultants, etc.). This includes hiring, training, staff development, performance management and annual performance reviews.

    2. Facilitate information security governance through the implementation of a Security Oversight Committee (SOC) governance program, including the formation of an information security steering committee or advisory board.

    3. Develop and publish up‐to‐date information security policies standards and guidelines. Oversee the approval, training, dissemination and maintenance of security policies and practices.

    4. Initiate, communicate and implement a risk‐based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.

    5. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.

    6. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes‐Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.

    7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.

    8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.

    9. Create a framework for roles and responsibilities for information ownership, classification, accountability and protection.

    10. Develop and enhance an information security management framework based on the following: Examples might include International Organization for Standardization (ISO) 2700X, ITIL, COBIT‐5 /Risk IT and National Institute of Standards and Technology (NIST or HITRUST Core Security Framework (CSF).

    11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.

    12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. 13. Ensure that security programs are compliant with relevant laws regulations and policies to minimize or eliminate risk from audit findings. 14. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.

    15. Develop a security incident event management program including the selection of SIEM and DLP tool set.

    16. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.

    17. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.

    18. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.

    19. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.

    20. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.

    21. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management.

    22. Perform related duties and fulfill responsibilities as required.

     

    Other Duties: 1. Other duties as assigned.

     

    Joining the Guthrie team allows you to become a part of a tradition of excellence in health care. In all areas and at all levels of Guthrie, you’ll find staff members who have committed themselves to serving the community.

     

    The Guthrie Clinic is an Equal Opportunity Employer.

     

    The Guthrie Clinic is a non-profit, integrated, practicing physician-led organization in the Twin Tiers of New York and Pennsylvania. Our multi-specialty group practice of more than 500 physicians and 302 advanced practice providers offers 47 specialties through a regional office network providing primary and specialty care in 22 communities. Guthrie Medical Education Programs include General Surgery, Internal Medicine, Emergency Medicine, Family Medicine, Anesthesiology and Orthopedic Surgery Residency, as well as Cardiovascular, Gastroenterology and Pulmonary Critical Care Fellowship programs. Guthrie is also a clinical campus for the Geisinger Commonwealth School of Medicine.

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • VP, Cybersecurity/CISO - IT Administration - Full Time
    Guthrie (Sayre, PA)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2026 Alerted.org