• Parkland Health Hospital System
  • $62,495.00 -146,840.00/year*
  • Dallas, TX
  • Information Technology
  • Full-Time
  • 2010 Flora St

position filled body

Check out similar listings!

Loading some great jobs for you...

Looking for your next opportunity? If so, choose Parkland and discover what a meaningful job feels like. Whether you work directly with patients or use your talent to support our care, you?ll be part of a team that?s providing valuable health services to Dallas County residents. And here, you?ll have the opportunity to put all your skills to work, and the support to grow and advance in your job and your field. Step into a career that will make a substantial difference for our patients?and for you. We blend cultures, talents, and experience into an exemplary health and hospital system.? Parkland has earned distinction as one of America?s Best Hospitals by U.S News and World Report every year since 1994.


Responsible for leading an established security team responsible for enterprise security architecture, as well as the planning, programming and implementation activities for all security tools and applications to ensure the security and confidentiality of enterprise IT assets.


-Must have a Bachelor's degree in Computer Science, Information Systems, Telecommunications, or a related field

-Must have seven years of experience in a role responsible for aspects of information security, such as securing operating systems, network data, software, web and facility access.
-Must have experience in a management position directly responsible for Information Security.
-Must have four years of experience in network design/architecture with an emphasis on security.

Equivalent Education and/or Experience:
-May have an equivalent combination of education and experience to substitute for both the education and the experience requirements.

-Must have a CISSP (Certified Information Systems Security Professional) certification in good standing, within one year of employment in role.
-Must have Federal Emergency Management Administration (FEMA) course certification for IS-700.A: National Incident Management System (NIMS) An Introduction within 30 days of placement in role.
-Must have Federal Emergency Management Administration (FEMA) course certification for IS-100.HCB: Introduction to the Incident Command System (ICS 100) for Healthcare/Hospitals within 30 days of placement in role.
-Must have Federal Emergency Management Administration (FEMA) course certification for IS-200.HCA: Applying ICS to Healthcare Organizations (ICS 200) within 30 days of placement in role.

Skills or Special Abilities:
-Must have an advanced knowledge of hardware, software, networks, operations, database applications, report writing software and telecommunications.
-Must have architectural, engineering and operational expertise in the IT network infrastructure security area.
-Must have architectural, design and operational expertise in the IT healthcare applications (i.e. Epic, Cerner, McKesson, etc.) in order to ensure security in all aspects of implementation.
-Must be able to demonstrate excellent technical documentation skills.
-Must have expert-level experience in system architecture design, recommending & implementing change, and communicating recommendations to senior leaders.
-Must be able to communicate effectively, verbally and in writing, with department personnel, user departments, managers, and internal audit with regard to business
needs and technical advancements.
-Must be able to prepare specifications and architecture/design documentation for complex programs that may have client server components.
-Must be able to lead a team of security engineers, analysts, architects and programmers and solve any technical issues that are escalated.
-Must have experience implementing and developing the use of standard security tools such as SIEM, antivirus, IDS/IPS, internet security gateways, sandboxing technologies, netflow analysis tools, two-factor authentication, identity management solutions, encryption tools, data loss prevention tools, etc.
-Must have a collaborative work style that includes and values the views of others in recommendations and decisions.
-Must be able to write stored procedures using complex SQL statement structures involving complex table joins and other such operations.
-Must demonstrate the ability to develop reports using off-the shelf tools such as Crystal or developed in the native development language.
-Must be able to review and test original source code written in various development languages for security vulnerabilities.
-Must be able to program/write scripts and applets in at least two of the following: Perl, Python, PHP, Ruby, Java, C/C++, C#, Powershell, AutoIT

Parkland Health and Hospital System prohibits discrimination based on age (40 or over), race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, genetic information, disability, national origin, marital status, political belief, or veteran status.

Company Description:

As the community hospital for Dallas, Parkland s tradition of providing exceptional care stretches back for more than a century. Many of Parkland's specialty areas have garnered national praise for excellence in care, research and technological innovation. Every step of the way, our talented professionals have maintained the highest standards of service and performance, recognizing the intrinsic worth of each patient and the importance of every interaction.

Parkland Health & Hospital System first opened its doors in 1894 and is now one of the largest public hospital systems in the country. Services include a Level I Trauma Center, the second largest civilian burn center in the U.S. and a Level III Neonatal Intensive Care Unit. Parkland is the primary teaching hospital for the University of Texas Southwestern Medical Center. Despite our growth, our mission and vision remain the same to care for you and your family. At Parkland, our patients are at the heart of everything we do.

Associated topics: iam, idm, information technology security, phish, protect, security, security engineer, security officer, threat, violation

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!