• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Chief Information Security Officer – Temple Health – Philadelphia

Chief Information Security Officer – Temple Health – Philadelphia

2021-06-09 by Geo

Cyber Security Job Philadelphia

Chief Information Security Officer – Temple Health – Temple University Health System Company Location Greater Philadelphia

Note: We may earn a commission from products or services when you click on a link and make a purchase.

CISO at Temple University Health System

Under the guidance of the CIO, implements and supports information security initiatives throughout the Health System to include all entities and TUP. Acts as a focus and resource for information security matters. Investigates and recommends secure solutions that implement information security policy and standards. Serves as the facilitator for all activities related to availability, integrity, and confidentiality of patient, provider, employee, and business information in compliance with the Health System’s security policies and procedures enterprise-wide. Oversees, implements, and monitors any special regulatory security requirements (e.g., HIPAA, HITECH). Participates in the development and implementation of standards and procedures for TUH, TUP, and TUHS policies, with the objective of performance improvement, quality control, and regulatory compliance for IT practices across TUP and TUHS. Is responsible for timely completion of projects and on budget. Plays a key role in implementing change in the department and across the Health System. Has contact and works with all levels of management and professional staff from the health system, School of Medicine, and other health organizations, and vendors.

READ Highest Paying Cyber Security Jobs

Education

  • Master’s Degree in Computer Science, Information systems, or related field (Required)
  • Combination of relevant education and experience may be considered in lieu of degree.

READ 5 Reasons Why Cyber Security Certification Is Worth It

Experience

  • 10 Years experience and a demonstrated working knowledge of network and systems security technology and practices across all major computing areas (Required)
  • 10 Years experience in IT Operations, including security work (application, network, database security), 5 of which are in health care (Required)
  • 10 Years experience in data center disciplines, computer operations, technical support, system infrastructure, telecommunications, system administration, and application support. (Required)
  • 5 Years experience of managerial responsibility and project management expertise (Required)
  • 5 Years experience with healthcare technology and a broad understanding/ experience with computer technology. (Required)

License/Certifications

CISSP – Cert Info Sys Security Prof (Preferred)

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version