About the job
Join us in transforming healthcare.
At Qualified Health, we are at the forefront of redefining healthcare through the innovative use of Generative AI. Our cutting-edge infrastructure ensures robust AI governance, tailored healthcare agent development, and vigilant algorithm monitoring, collaborating with leading health systems to incite meaningful change.
This role is more than just employment; it is a chance to pioneer the future of AI in healthcare, tackle intricate challenges, and leave a profound impact on patient care. If you possess ambition, creativity, and a desire to act swiftly, we invite you to join our team.
Be part of shaping the future of healthcare with us.
Position Overview:
The IT and Security Operations Analyst will be the linchpin of our security, compliance, and IT operations at Qualified Health. You will oversee daily functions, including vendor assessments, identity and access management (IAM), device oversight, IT vendor coordination, compliance documentation, and responding to security questionnaires from our health system partners during their due diligence process.
This is a crucial position within our rapidly expanding organization, managing sensitive health information across 15+ major health systems. The operational security work is vital, evolving, and increasingly significant. Currently, some of these tasks are absorbed by our data integration team, individuals focused on deploying AI workflows rather than handling password resets and vendor SOC 2 report reviews. You will take on these essential operational responsibilities, allowing our data team to focus on innovation.
You will collaborate closely with the Director of Security & Compliance and a security engineer, forming a dedicated team responsible for the overall security and IT operations posture of the company.
Key Responsibilities:
- Oversee vendor security evaluations and assessments, ensuring compliance with our security standards while maintaining an updated vendor inventory.
- Administer IAM across company systems, including user provisioning, access reviews, and role management.
- Manage device enrollment, mobile device management (MDM) policies, and endpoint compliance.
- Coordinate with outsourced IT support for employee onboarding/offboarding and escalated support requests.
- Assist in the ongoing maintenance of HITRUST compliance and evidence collection.
- Respond to client security questionnaires, alleviating this task from the integration team.
- Maintain security documentation, policies, and procedures.
