Jobs in Phl taguig 5th ave, e, square, crescent park west
Info Security Analyst
Euroasia Executive Search, IncBGC, TaguigCredit Officer for Corporate Accounts
iCrescere Services CorpBGC, Taguig- New!
IPC Regional Planner
Kimberly-Clark CorporationTaguig, 03, PH- Promoted
Ecommerce Manager
Solenne Home CorporationBGC , Taguig, National Capital Region, PHJob Posting Title BI Associate (TCF)
ConcentrixPHL Bonifacio Global City, Bonifacio One Technology TowerIT Project Manager
Ubiquity Global Services, Inc.BGC, Taguig, PHNOC Team Manager
We Search Searchers Staffers CorpBGC, PhilippinesAdmin & Finance Assistant (Reliever)
The VITO GroupBGC, Taguig, PhilippinesAVP, Head of IT Infrastructure and Operations
FWD Life Insurance CorporationBGC Taguig, PhilippinesRevenue Management Analyst
OPENLANEBonifacio Global City, Taguig, National Capital Region (Manila), PhilippinesSystems Engineer
Staff4MeTaguig , BGC, National Capital Region, PHR2A Manager - Payroll Accounting
AECOMTaguig City, BONIFACIO STOPOVER, PhilippinesAudiobook Quality Control
John Clements Consultants, IncBGC TAGUIGTechnology Architect (CRM Tribe)
GlobeTD TaguigData Analyst : Purchasing / Procurement Officer
Nezda Technologies Inc.BGC Taguig- Promoted
HR Assistant
Dempsey Resourse Management Inc.BGC - Taguig City, National Capital Region, PHHR Team Lead
Knoll Ridges ConsultancyBGC Taguig, FilipinasSenior Rewards Manager
Curran Daly + AssociatesBGC, TaguigCredit Portfolio Manager
ESOL PTE LTDBGC, PhilippinesInfo Security Analyst
Euroasia Executive Search, IncBGC, TaguigJob Description :
Change Healthcare is looking for an Information Security Risk Management Analyst to assist in executing the Information Security Vendor Risk Management Program. The resource will partner with our existing risk practitioners to assess the level of risk associated with a Vendor’s service and ensure the application of Change Healthcare technical standards, required contractual terms, and due diligence to measure vendor’s compliance with Change Healthcare requirements.
Under general direction, the position performs all procedures necessary to ensure information systems assets’ safety and protect systems from intentional or inadvertent access or destruction. Interfaces with the user community to understand their security needs and implements procedures to accommodate them. Ensures that the user community understands and adheres to necessary procedures to maintain security. This position requires familiarity with domain structures, user authentication, and digital signatures. It also conducts an accurate evaluation of the level of protection needed. It involves understanding network layouts and protocols, firewall theory, and configuration. It also requires experience with host-based security on one or more platforms and conceptual knowledge of database security. Must be able to articulate security concerns to management to be weighed against business needs.
Responsibilities
- Assess the level of risk associated with vendors services
- Provide / Define technical solution, contract requirements, and necessary due diligence to relevant stakeholders
- Execute security risk assessments of vendors providing services to Change Healthcare
- Be the Information Security subject matter expert to stakeholders outside of information security such as Procurement, Business Units, and Enterprise Technogie functions
- Measure the vendor’s compliance to critical controls using established procedures
- Analyze collected information to identify critical risks (findings)
- Partner with vendors and business teams to develop and track remediation plans
- Conduct on-site assessments of domestic or international vendor facilities as directed
- Coordinate responses to customer questionnaires, assessments, and audits of Change Healthcare security functions
- Gather, organize, and update security control documentation for easy reference during audits
- Identify and escalate unreasonable audit requests or high-risk vendors to minimize risks to Change Healthcare
- Deliver risk reporting to IT and business leadership and partner with enterprise risk management functions
- Maintain and evolve InfoSec Vendor Risk Management program tools, policies, and procedures
Job Requirements :
Solid understanding of a wide variety of Information Technology concepts
EDUCATIONAL REQUIREMENTS
RELATED EXPERIENCE REQUIREMENTS / QUALIFICATIONS
Preferred Requirements
Experience with Lockpath Keylight GRC suite is a plus
ADDITIONAL INFORMATION :