Information Security Engineer II
- ACH Arkansas Children's Hospital
- Little Rock
- 1w ago
- Full-Time
- On-site
ARKANSAS CHILDREN'S IS A TOBACCO FREE WORKPLACE. FLU VACCINES ARE REQUIRED. ARKANSAS CHILDREN'S IS AN EQUAL OPPORTUNITY EMPLOYER. ALL QUALIFIED APPLICANTS WILL RECEIVE CONSIDERATION FOR EMPLOYMENT WITHOUT REGARD TO RACE, COLOR, RELIGION, SEX, SEXUAL ORIENTATION, GENDER IDENTITY OR EXPRESSION, NATIONAL ORIGIN, AGE, DISABILITY, PROTECTED VETERAN STATUS OR ANY OTHER CHARACTERISTIC PROTECTED BY FEDERAL, STATE, OR LOCAL LAWS.
CURRENT EMPLOYEES: Please apply via the internal career site by logging into your Workday Account (https://www.myworkday.com/archildrens/)and search the "Find Jobs" report.
Work Shift:
Day ShiftTime Type:
Full timeDepartment:
CC017129 Information Technology Security and SupportAnalyzes and resolves security issues, concerns, questions, incidents and events. Evaluates and identifies risks and threats; addresses unexpected problems. Provides security monitoring, vulnerability assessment, and analysis into potential security related events and incidents. Ensures appropriate access to systems for authorized associates while protecting against unauthorized access. Operates IT security systems. Evaluates new information security threats and their potential threat to the company.
The ideal candidate has at least two (2) years of experience with:
Palo Alto firewalls
Microsoft Purview (data protection, compliance, and governance)
Microsoft 365 security (Defender for Office 365) and cloud security (Defender for Cloud)
Expected start date — July 6, 2026
1. Monitors and advises on information security issues related to the systems and workflow.
2. Monitors security logs and related security events through a SIEM tool.
3. Performs vulnerability scans and penetration tests; assists in developing and maintaining scripts, routines and software to perform vulnerability threat assessments.
4. Participates as a member of the security incident response team; evaluates security incidents, assist in developing solutions. Assists in a computer crime or incident scene.
5. Monitors security controls effectiveness (e.g. user add/remove, systems patching, firewall changes) and the company’s security subsystems.
6. Participates IT security projects.
7. Reviews vulnerabilities and assist in making recommendations to IT management.
8. Assists in evaluating security aspects of systems changes (e.g. wireless, mobile, cloud solutions,).
9. Maintains user security awareness training.
10. Performs other duties as assigned.