Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Cyber Security Manager – Work From Home

This role has a work from home option and candidate must be able to attend meetings on site as requested.

The Cyber Security Development Operations & Orchestration manager is responsible for supporting critical cyber security functions by orchestrating and automating alerts and processes, engaging in the use case development process, and managing cyber security technologies. This position is highly technical and requires a solutions-oriented person with a “can do attitude”.

Our ideal candidate will have the following:

  • Experience administering security technology including: IDS/IPS and other network security tools, Anti-Virus / Anti-Malware, Endpoint intelligence tools, SIEM, Proxy, Forensic tools, DNS, Web Application Firewalls WAF, and Vulnerability Management tools.
  • Certifications such as Splunk “power user” or above, CCNA or above, MCSA (Azure Security Engineer associate, Microsoft 365 Certified Security Administrator Associate, or other Microsoft Certifications), Linux certifications, CEH, GCIH, Python certifications.
  • Ability to use programming languages such as Python, and PowerShell to automate processes, build APIs and enrich Incident Response alerts.
  • Splunk skills including Dashboarding, Data Modeling, CIM compliance, and using SPL to write advanced searches.
  • Knowledge of operating systems (Windows and Linux)
  • Ability to provide cyber security support by planning, coordinating, integrating and synchronizing cyber defense and prevention activities, ensuring compliance with all applicable state and federal cyber laws and regulations
  • Ability to Write Report to communicate Sutter Health’s risk profile impact to peers and management
  • Knowledge of cyber security solutions, policies and technologies
  • Knowledge of the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment, including the anatomy of a cyber-attack
  • Ability to use Internet Technologies including DNS, routing, SMTP, HTTP, DHCP, FTP, etc.
  • Experience managing a highly technical team

Position Overview:
As a Cyber Security Manager, you will provide support and guidance to Sutter Health regions and affiliates to develop, implement, operate and manage the Cyber Security program and team. You will represent the Privacy & Information Security Department on project teams and initiatives and work with operations support teams to identify and recommend solutions on security-related issues. You will use your exceptional leadership skills to provide oversight over a broad range of security duties that require a high level of technical understanding. Additionally, you will be accountable to:

 

Manage the Cyber Security team and ensure Sutter Health is in compliance with information security and privacy laws
Oversee design, engineering, analysis, research, testing and monitoring
Assist in the development, implementation, and maintenance of Cyber Security solutions
Conduct investigations of potential or actual cyber security events and documents, and communicate the risks to executive leadership
Collaborate with Privacy & Information Security staff regarding the development and maintenance of Sutter Health’s Cyber Security program and policies
Serve as Cyber Security Manager and advisor to the Chief Privacy & Information Security Officer, the Executive Director of Cyber Security & Investigations and Sutter Health affiliates

You will work with all levels of staff and leadership and therefore must be able to interact effectively with broad and diverse groups. You should be well organized and be able to prioritize assigned work and convey complex technical topics into language and diagrams understandable to a wide audience.

Qualifications:
Bachelor’s Degree in Computer Science, Information Science or related field or equivalent education/experience
Certified Information Systems Security Professional (CISSP) required within 4 months of date of hire
10 or more years of experience as an IT Security professional with progressively responsible management duties in security solutions and compliance reporting
Proven technical background in systems and network security
Extensive experience with security software, incident response, disaster recovery, firewalls, and network monitoring
Proven experience managing and tracking large scale projects and coordinating/planning resource allocations while tracking commitments to insure on-time delivery
Demonstrated professional experience working with PCI, SOX and HIPAA compliance regulations and applying them to security monitoring and alerting practices
Proven experience working with STIX/TAXXI based Threat Monitoring and Intelligence integration with SIEM solutions
Significant experience engineering High Availability infrastructure solution designs

Preferred Qualifications:
Healthcare information technology industry experience

 

Source: ziprecruiter