Overview
Remote
$80 - $85
Accepts corp to corp applications
Contract - W2
Contract - 1 Year(s)
Unable to Provide Sponsorship
Skills
Epic Security Certification
Epic Security Audits
ServiceNow
Epic Security Coordinator
Health information Technology
Epic
HIPAA
Epic User Access Request
Job Details
- Process and fulfill Epic user access requests, including account creation, modifications, deactivations, and role changes.
- Assign and maintain security templates, user roles, and access levelsbased on job responsibilities, adhering to least privilege and segregation of duties
- Coordinate Epic security audits, access reviews, and monitor for inappropriate or excessive permissions.
- Support onboarding and offboarding processes, ensuring timely updates to Epic access based on employment status, role changes, and facility requirements.
- Ensure all access requests and configurations align with HIPAA, state IT security policies, and organizational standards.
- Participate in internal and external audits, providing reports and documentation as required.
- Identify and report security risks or access anomalies to the IT Security & Compliance Manager.
- Serve as the primary point of contact for Epic access issuesacross 13 facilities, partnering with HR, Clinical Informatics, and department leadership.
- Respond to incidents and service requests related to Epic user access in ServiceNow, escalating complex issues as needed.
- Support Epic go-lives, upgrades, and maintenance events by ensuring accurate and timely access provisioning.
- Maintain accurate records of all Epic access requests, approvals, and changes to support audit readiness.
- Generate reports on user access, role utilization, and permissions for compliance, operational reviews, and process improvements.
- Develop and maintain documentation, including standard operating procedures (SOPs), training materials, and knowledge base articles for Epic security processes.
Certified by Epic in Security and Security Coordinator | Required | 3 Years |
|
Understands the Epic software security structures, including user profiles, roles, and security classes. | Required | 3 Years |
|
Understanding of concepts of confidentiality and data security | Required | 5 Years |
|
Security administration experience | Required | 5 Years |
|
Problem Solving, Collaboration and Customer Service | Required | 5 Years |
|
Oral and Written communications | Required | 5 Years |
|
Ability to identify and escalate issues and mitigate identified risks. | Required | 5 Years |
|
Health information technology experience | Highly desired | - |
|
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.