IT Security Architect

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2

Skills

Identity & access management (IAM)
Vulnerability Management
Cloud technologies
IT Governance
Process Modeling (Visio)
PowerBI
Security Architecture
SharePoint
Cybersecurity
NIST 800 Series
CSF
COBIT

Job Details

Responsibilities:

Design/Institutionalize Enterprise Security/technology Patterns

Assist teams on initiatives, providing tactical and architectural considerations on legacy solutions

Evaluate new implementations while navigating a complex organizational environment with diverse stakeholders to accurately present the scenario, and present sound analyses and recommendations with steps for approval and implementation

Manage a body of work independently, leveraging available process documentation, templates, systems and resources.

Assist in issue resolution, communicating concerns effectively to the right personnel, operationalizing Security Architecture practices and extending the scope of ITD Governance & Security Architecture.

Create and socialize clear, impactful and polished architecture artifacts, such as:

Standards and guidelines
Management Briefs
Security Training
Updated processes
Knowledge Base articles
PowerPoints
Visio Process Diagrams
PowerBI Dashboards
Excel Reports
Collaborate with Business areas and cross- functional Enterprise Architects to fully understand business needs and provide strategic consultation on data security and risk-averse implementation.
Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and exception documentation.
Support Vulnerability Management by ensuring VM data quality and ingestion for remediation team execution.
Integrate Security into Architecture Roadmaps by developing artifacts and ensuring other architects roadmaps contain integral security measures and best practices.
Research and share findings of architecture governance, controls, and peer review processes and projects with regards to platform technology, security, and cloud.
Document process diagrams and script narratives/executive summaries.
Create Business focused documentation for diverse technical audiences.
Research and provide written guidance on alignment with security policies/standards.
Partner with architects, other technical team members and to develop roadmaps and strategies to support agency KPIs
Qualifications:

State/Industry experience in information security and IT risk management with a focus on security, performance, and reliability.

Federal/State compliance & standards alignment experience reviewing proposed changes for programs and projects.

Policy Development experience, utilizing, and presentation of information security architecture policies, standards and procedures

Monitoring information security compliance experience with information security architecture policies and standards.

Information security framework experience like NIST 800 Series, CSF & COBIT.

Substantial technical expertise in at least two areas:

Cloud technologies

Identity & access management (IAM)

Vulnerability Management

Firewalls

Computer Forensic Techniques

Databases

Collaboration Tools

Web & Mail Services

Security direction and design inputs experience with information security capabilities, and strategic technology alternatives.

Communication & collaboration experience with excellent written and oral communication and presentation skills, and the ability to simplify technical terms and collaborate with diverse personnel.

Demonstrated experience working with a broad cross-section of personal including all levels of management and external entities such as VITA consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with the Office of Information Security

Fast-Paced environment experience with experience acquiring new skills/knowledge to meet customer needs.

Customer perspective experience understanding IT customers priorities and the business criticality of platforms, applications and services.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About TriosysIT Inc.