TECHNICAL ENGINEER Education, Training & Library - Irving, TX at Geebo

TECHNICAL ENGINEER

The future is our choiceAt Atos, as the global leader in secure and decarbonized digital, our purpose is to help design the future of the information space.
Together we bring the diversity of our people's skills and backgrounds to make the right choices with our clients, for our company and for our own futures.
Epic Security SR AnalystRole Description:
Epic Security Analyst is responsible for working with the Customer Security Lead to coordinate all aspects of Healthcare Application Security, including the configuration and maintenance of security and access control functions for the Epic application.
In addition, the Security Analyst provides audit, privacy and compliance support for Epic security and access related issues.
Education:
Master's degree in computer science, a related field, or a clinical field and two years' work related experience in the information technology field or a combination of clinical or operational healthcare environments; OR Bachelor's degree in computer science, a related field, or a clinical field and four years' work related experience in the information technology field or a combination of clinical or operational healthcare environments; OR Associate's degree in computer science, a related field, or a clinical field and five years' work related experience in the information technology field or a combination of clinical or operational healthcare environments; OR Six years work related experience in the information technology field or a combination of clinical or operational healthcare environments; OR Equivalent combination of education and experience where one year of experience will be substituted for an Associate's degree and two years of experience will be substituted for a Bachelor's degree.
Experience:
oFive years' work related experience with access and/or security.
oWorking knowledge of user provisioning procedures and role based access control.
oWorking knowledge of security as it relates to application support.
oEpic Security Certification required.
Provider Administration Badge and Certified Identity Management Professional (CIMP) is a plus.
oStrong communication skills - both written and verbal.
oMicrosoft Office(Outlook, Word, Excel, PowerPoint)oExperience with the ServiceNow incident tracking system.
oStrong customer service skills.
oTime Management.
Job Related Knowledge, Skills, and Abilities:
oAbility to work in a highly autonomous role by demonstrating self-motivation and creativity in design approach.
oAbility to function effectively in a very dynamic team environmentoAbility to communicate effectively with a wide variety of teams and departmentsoAbility to proactively pursue problem resolution to satisfy customer needs.
oAbility to proactively discover/test/analyze new security/access enhancements/features independently.
oAbility to manage multiple complex tasks efficiently while successfully meeting goalsoAbility to work with users to accurately assess and diagnose system problems as defined by the user.
oWorking knowledge of hospital operations, ambulatory operations and the patient care processHere at Atos, diversity and inclusion are embedded in our DNA.
Read more about our commitment to a fair work environment for all.
Atos is a recognized leader in its industry across Environment, Social and Governance (ESG) criteria.
Find out more on our CSR commitment.
Choose your future.
Choose Atos.
Recommended Skills Access Controls Administration Application Security Auditing Clinical Works Communication Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.