Job Specifications
About Pacific Health Group
At Pacific Health Group, we are at the forefront of revolutionizing healthcare. You will play a vital role in this mission. We are dedicated to improving health outcomes by addressing social determinants of health and coordinating comprehensive community-based services, particularly through our programs. If you are passionate about making a difference and thrive in a dynamic, mission-driven environment, we invite you to join our team.
Overview
The Director of Information Technology & Information Security is responsible for the end-to-end ownership of all technology systems, data security, and regulatory compliance at Pacific Health Group. This role establishes, governs, and enforces the organization's security posture, ensuring that all systems, data, and operations meet or exceed HIPAA, HITECH, and industry best practices.
This position functions as the single point of accountability for IT infrastructure, cybersecurity, data protection, PHI safeguards, and security governance. The role requires both strategic leadership and hands-on execution in a regulated healthcare environment.
Core Areas of Responsibility
Information Security Program Ownership
Architect and maintain a formal, organization-wide Information Security Program
Define and enforce security controls across applications, infrastructure, devices, and users
Establish policies for data classification, encryption, access control, logging, monitoring, and retention
Ensure least-privilege access and zero-trust principles are implemented across systems
Continuously monitor evolving threat landscapes and proactively adapt controls
HIPAA, PHI & Regulatory Compliance
Serve as the internal authority for HIPAA Security Rule and Privacy Rule compliance
Ensure proper safeguards for the creation, storage, transmission, and disposal of PHI
Maintain compliance documentation, risk assessments, and audit evidence
Lead HIPAA risk analyses and remediation plans
Oversee Business Associate Agreements (BAAs) from a security and IT standpoint
Coordinate and support internal and external audits, assessments, and investigations
IT Infrastructure & Systems Oversight
Own the design, implementation, and maintenance of all IT systems, including:
Cloud platforms
Networks and connectivity
End-user devices and endpoints
SaaS applications and internal tools
Ensure systems are secure, resilient, and scalable
Implement and maintain:
Backup and disaster recovery plans
Business continuity procedures
System redundancy and failover strategies
Approve and govern all technology deployments and architectural changes
Cybersecurity Operations & Incident Response
Establish formal incident response plans and escalation procedures
Lead response efforts for security incidents, attempted breaches, phishing, impersonation, or data exposure
Conduct root cause analysis and implement corrective actions
Ensure proper breach notification processes are followed when required by law
Maintain logs, alerts, and monitoring systems to detect suspicious activity
Data Protection & Privacy
Define and enforce controls for sensitive data, PHI, and confidential business information
Ensure encryption standards are applied to data at rest and in transit
Govern data access, sharing, and retention policies
Partner with legal and compliance stakeholders on privacy matters
Prevent unauthorized data access, leakage, or misuse
Vendor, Tool & Third-Party Risk Management
Evaluate security posture of third-party vendors and platforms
Approve technology vendors based on security, compliance, and risk criteria
Monitor ongoing vendor compliance and contractual obligations
Ensure third-party access is controlled, monitored, and revoked as needed
Governance, Training & Enforcement
Develop and enforce IT and security policies applicable to all staff
Deliver security awareness training, including phishing and impersonation prevention
Ensure staff understand approved communication channels and security protocols
Investigate and address violations of IT or security policy
Establish clear escalation paths and disciplinary guidance related to security breaches
Strategy, Reporting & Executive Advisory
Define a long-term IT and security roadmap aligned with business growth
Provide regular reporting to executive leadership on:
Security risks
Compliance status
Incidents and trends
Improvement initiatives
Advise leadership on technology risk, investments, and trade-offs
Balance operational efficiency with regulatory and security requirements
Requirements
Required Qualifications
Extensive experience in IT, cybersecurity, or information security leadership
Demonstrated expertise in HIPAA compliance and healthcare data protection
Strong understanding of cloud security, endpoint security, and identity management
Experience creating policies, controls, and compliance frameworks from the ground up
Ability to operate with high autonomy and accountability
Preferred Qualifications
CISSP, CISM, or equivalent s