Associate Director of Cybersecurity, Physical Security, and AI Governance

<strong>Overview</strong><br><br><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">With over 50 years of proven success, ECG, ranked as a Best Midsized Firm to Work For 2025 by <em>Consulting Magazine</em>, is the most experienced healthcare consulting firm in the US. Working exclusively in this space, our people consistently demonstrate their ability to solve challenges for providers and achieve better patient outcomes. Across our eight office locations, we’re seeking individuals who will show the courage to find innovative solutions and make a direct impact on the delivery of healthcare services nationwide.</span></p><p style="margin-bottom: 0in;"> </p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">About ECG</span></strong></p><p style="margin: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">ECG is a national consulting firm that is redefining healthcare together with its clients. We provide a broad range of strategic, financial, operational, and technology-enabled consulting services to the full continuum of care, including hospitals, health systems, medical groups, academic medical centers, children’s hospitals, cancer centers, ambulatory surgery centers, investors, and payers/health plans.</span></p><p style="margin: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;"> </span></p><p style="margin: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">Our work focuses on creating practical, tailored solutions that help clients maximize resources and achieve sustainable results. We value collaboration, integrity, and innovation, and are committed to fostering an inclusive and supportive work environment.</span></p> <br><strong>Job Details</strong><br><br><p style="margin-bottom: 0in;"><strong><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Your Opportunity with ECG: </span></strong><strong><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Associate Director of Cybersecurity, Physical Security, and Artificial Intelligence (AI) Governance</span></strong></p><p style="margin: 0px;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Reporting to the IT director, the associate director is responsible for defining and advancing the organization’s long‑term approach to cybersecurity, physical security, data governance, and responsible AI use.</span></p><p style="margin: 0px;"> </p><p style="margin: 0px;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">This role is heavily strategic and governance focused. The associate director establishes vision, policy, and guardrails; evaluates risk; and provides executive‑level insight—while partnering with IT, data and analytics, facilities, legal, compliance, and business leaders to support execution.</span></p><p style="margin: 0px;"> </p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">Your Responsibilities May Include</span></strong></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans', sans-serif; color: #020c4a;"><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Enterprise Security, Data, and AI Governance Strategy</span></span></em></span></p><ul style="margin-top: 0in;"><li style="margin-bottom: 0in;"><span style="font-size: 12pt; line-height: 107%; font-family: 'Open Sans', sans-serif; color: #020c4a;"><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Define and maintain a multiyear enterprise strategy spanning:</span></span></li><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif;">Cybersecurity.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Physical security.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Data analytics governance (internal data focus, external client data protection).</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">AI and automation risk.</span></li></ul><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Ensure security, data, and AI considerations are embedded into IT architecture, cloud platforms, analytics initiatives, and application delivery.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Advise IT leadership on risk, opportunity, and investment priorities related to emerging technologies.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Translate technical, physical, and AI‑related risks into clear business impact for executive decision‑making.</span></li></ul><p style="margin: 12pt 0in 0in;"><em><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;"><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">AI and Data Governance</span></span></em></p><ul style="margin-top: 0in;"><li style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">Establish and maintain the organization’s AI governance framework, including:</span></li><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif;">Acceptable and responsible AI use.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Data privacy, security, and ethical guardrails.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Oversight and accountability for AI‑enabled tools.</span></li></ul><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Partner with data and analytics teams to define standards for data classification, protection, and analytics platform security.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Serve as the escalation point for AI‑related risk, misuse, or policy exceptions.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Balance security needs with business needs in a manner that ensures safe practices while not prohibiting key components of business objectives.</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Governance, Policy, and Risk Management</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Own enterprise governance for cybersecurity, physical security, data protection, and AI use within the ECG organization.</span></li><li><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Develop and maintain policies, standards, and control objectives.</span></li><li><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Lead or oversee enterprise risk assessments across cyber, physical, data, and AI domains.</span></li><li><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Align governance practices with recognized frameworks, such as NIST, ISO, and applicable privacy or AI standards.</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Cross‑Functional Leadership and Collaboration</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Provide strategic oversight into cybersecurity, physical security, and data governance functions (direct or matrixed).</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Partner closely with IT infrastructure, applications, architecture, data and analytics, HR, legal, and compliance teams.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Act as the security, data, and AI-governance authority within IT leadership forums.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Promote a culture of responsible innovation that enables progress while maintaining trust and control.</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Investment, Metrics, and Executive Reporting</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Advise IT leadership on security, analytics, and AI investment priorities.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Define and track KPIs and KRIs related to security posture, data governance maturity, and AI risk.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Deliver executive‑ready reports on trends, risks, and program effectiveness.</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Incident Preparedness and Oversight</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Define enterprise‑level strategies for cyber incidents, physical security events, data breaches, and AI misuse scenarios.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Ensure leadership readiness for high‑impact incidents.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Lead post‑incident strategic reviews focused on systemic improvement and governance maturity.</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Collaboration with Legal and Compliance</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Partner with SHS and ECG compliance to ensure AI and data governance aligns with regulatory, contractual, privacy, and ethical obligations.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Codevelop policies addressing acceptable AI use, intellectual property, confidentiality, and third‑party risk.</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Support coordinated responses to AI‑related incidents, audits, or regulatory inquiries.</span></li></ul><p style="margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;"> </span></p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Qualifications</span></strong></p><p style="margin-bottom: 0in;"><em><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Required Qualifications</span></em></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Bachelor’s degree in information security, computer science, data management, or a related field (or equivalent experience)</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Typically, 7+ years of experience in cybersecurity, risk management, enterprise IT, data governance, or related leadership roles</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Demonstrated experience leading enterprise‑level security strategy and governance</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Strong understanding of: </span></li><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Cybersecurity and physical security principles</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Data analytics platforms and data protection</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">AI and generative AI risk, governance, and ethical considerations</span></li></ul><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Proven ability to communicate complex risk topics to executive audiences</span></li></ul><p style="margin: 12.0pt 0in 0in 0in;"><span style="font-size: 12pt;"><em><span style="font-family: 'Open Sans',sans-serif; color: #020c4a;">Preferred Qualifications</span></em></span></p><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Advanced degree (MBA, MS, or equivalent)</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Relevant certifications such as CISSP, CISM, CRISC, CPP, CDMP, or AI-governance credentials</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Experience supporting cloud‑based, analytics‑driven, and AI‑enabled enterprise environments</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Experience presenting to executive leadership or governance committees</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Experience with Microsoft environments (Azure, Fabric)</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Experience with security products, including but not limited to: </span></li><ul style="margin-top: 0in;"><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Defender</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Sentinel</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Purview</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Entra</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Azure Web Application Firewall</span></li><li style="color: #020c4a; margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif;">Brivo badging system</span><strong style="color: #000000;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;"> </span></strong></li></ul></ul><p style="margin-bottom: 0in;"> </p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Job Locations</span></strong></p><ul style="margin-top: 0in;"><li><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">Remote</span></span></li><li style="margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Travel as needed (approximately 10%)</span> </li></ul><p style="margin-bottom: 0in;"> </p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Schedule</span></strong></p><p style="margin-bottom: 0in;"><span style="font-size: 12.0pt; font-family: 'Open Sans',sans-serif; color: #020c4a;">Full time/exempt</span></p><p style="margin-bottom: 0in;"> </p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">What You Can Expect of Us</span></strong></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">To reward our driven, innovative, and passionate employees, we’ve built a company culture that’s centered on performance. We offer an attractive compensation package, challenging work, and an entrepreneurial environment where you can take ownership of your career—and get out as much as you put in.</span></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;"> </span></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">This job is eligible to participate in ECG’s annual incentive compensation program, which reflects ECG’s pay-for-performance philosophy. The job is also eligible to participate in ECG’s benefit plans, which include medical, dental, and vision coverage; a 401(k) matching program; unlimited PTO; and other wellness programs.</span></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;"> </span></p><p style="margin-bottom: 0in;"><strong><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">Apply now and make an impact for years to come.</span></strong></p><p style="margin-bottom: 0in;"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">To begin the recruitment process, please submit your resume via our career site at </span><a href="https://careers.ecgmc.com/" target="_blank" rel="noopener"><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">https://careers.ecgmc.com</span></a><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">.</span></p><p style="margin-bottom: 0in;"><em><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;"> </span></em></p><p style="margin-bottom: 0in;"><em><span style="font-size: 12pt; font-family: 'Open Sans', sans-serif; color: #020c4a;">ECG provides equal employment opportunities to all employees and applicants for employment without regard to sex, race, color, religion, national origin, citizenship, ancestry, age, disability, pregnancy, medical condition (cancer and genetic characteristics), genetic information, gender, gender identity or expression, sexual orientation, marital status, military or veteran status, or any other legally protected characteristic. We participate in E-Verify as part of our onboarding process. Having the permanent legal right to work in the United States is a condition of employment. ECG is not currently able to provide assistance to candidates requiring sponsorship or a visa.</span></em></p><p style="margin-bottom: 0in;"> </p><p style="margin-bottom: 0in;"><em><span style="color: #020c4a;"><span style="font-size: 12pt; font-family: Helvetica, sans-serif;">#LI-SC1 #LI-Remote</span></span></em></p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...