Temporary Sr Cybersecurity Architect
Job Type : Contract
Contract length: 11 Months
Pay Range : $ 78.57– 78.57 /Hr
- The Senior Cybersecurity Identity and Access Management “IAM” Architect leads secure adoption of both Customer Identity and Access Management and Workforce Identity and Access Management architectures and solutions, by serving the company as an adviser on best practices.
- The architect is responsible for designing and effectively implementing enterprise IAM security strategies, that guide IT security direction.
- They are accountable for the security architecture across a variety of applications or domains and are assigned to projects/initiatives of large size, complexity and risk.
- The Senior Cybersecurity Architect develops actionable security blueprints, principles, models, designs, standards and guidelines to ensure enterprise information technology architecture is consistent, usable, secure and adds value to the business.
- They interact with vendors, IT and business area contacts to facilitate flexible, scalable and cost-effective security solutions and provide technical guidance to less experienced Security Architects.
- Responsible to drive secure IAM adoption activities.
- Responsible for design and implementation of security strategy, architecture and platforms.
- Responsible for enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls.
- Accountable for adhering to enterprise architecture standards, ensuring security technology standards and best practices are maintained across the organization and contributing to enterprise architecture strategy-setting.
- Responsible for ensuring necessary security controls are part of technical designs.
- Participates in security governance processes.
- Participates in IT security efforts across all business areas and client groups.
- Troubleshoots, recommends and executes action plans for issue resolution.
- Serves as security architecture subject matter expert to business areas, project teams and vendors to apply and execute appropriate use of technology solutions and lead efforts to examine technology vision, opportunities and challenges.
- Builds consensus around principles of security architecture and interprets and clarifies these principles.
- Participates in the evaluation, selection and implementation of technology solutions including providing detailed analysis of pros and cons and build vs buy options.
- Provides technical guidance to less experienced Security Architects.
- Participates on project teams contributing input with regard to security standards and the impact to technology.
- Investigates and reports on security threats and incidents.
- Conducts post-event reviews of security incidents.
- Maintains operational, architectural and design documentation including procedures, task lists, and architecture blue prints.
- Evaluates strengths and flaws in Security Architecture designs including performance, confidentiality, integrity, availability, access and total cost of ownership.
- Facilitates project handoffs including preparing documentation, educating and supporting to ensure smooth transitions.
- Selects and designs tools that allow reuse of design components and patterns between projects.
- Develops actual working solutions or prototypes based on their own designs and resolves any issues that arise.
- Highly developed proficiency in creating architectural designs for gradually complex designs
- Highly adept at consulting, negotiating, communicating, consensus building, presentation and facilitation
- Demonstrated ability to learn from mistakes and apply constructive feedback to improve performance
- Information Security certifications; CISSP is required
- Highly adept at innovating and thinking beyond established standards and processes
- Advanced knowledge of and demonstrated experience applying current and emerging technology security solutions and trends including security and regulatory industry requirements
- Demonstrated effective decision-making skills related to implementing security architecture and design
- Knowledge of Information Security procedures and controls.
- Knowledge of common information management systems
- Knowledge of Project Management Methodologies
- Demonstrated experience with defense in depth, trust levels, privileges and permissions
- In-depth knowledge of development practices of security technologies
- Demonstrated leadership skills through project or technical leadership experience
- Demonstrated ability to understand overall IT strategy and apply/implement IT strategy in assigned projects/initiatives
- In-depth business process knowledge of several key business functional areas
- Ability to communicate highly complex technical information clearly and articulately for all levels and audiences
- Health care industry related experience is preferred
- Experience using Agile methodology
- Extensive experience with IT Infrastructure Services components and how to enable the business while at the same time providing the appropriate level of Security controls
- Experience with Network Security principles, such as Firewalls, perimeter defenses, load balancers, proxy servers
- Experience with End-Point, Remote Access, Network Systems Management, Messaging & Collaboration, and Logging & Monitoring Security solutions
- Big Data architectures such as Hortonworks suite of products: Hadoop, Kafka, Redis, and Object Storage principles
- Identity and Access Management “IAM” concepts and principles such as federation, delegated access (user managed access “UMA”), single sign on, OAuth, and OpenID.
- ForgeRock and/or SiteMinder product suite knowledge
- Securing Digital Engagement models such as mobile, IOT, wearables, etc.
- Security engineering for API gateways, REST Web Services, JSON Web Tokens “JWT”, SOAP
- Knowledge of CMS ARS controls and ability to design security controls to support control objectives
- 5+ Years Information Technology Experience
- 5-8 years Security, Application or Systems Architecture Experience
Education Level Education Details
- Bachelor’s degree required or relevant work experience
How to ApplyFor immediate consideration, please send your resume directly to Lory Weir at email@example.com. You can view all of our open positions at www.hornetstaffing.com
61 total views, 3 today