IT Security Architect

Overview

Hybrid
Depends on Experience
Contract - W2
Contract - 2 week(s)

Skills

Networking_InfoSec
Networking_Firewall/Security

Job Details

Our government client is looking for experienced IT Security Architect on a hybrid 12+ months renewable contract opportunity in Columbia, SC.

Role: IT Security Architect

SCOPE OF THE PROJECT:
THE POSITION WILL WORK AS A SECURITY IDENTITY AND ACCESS MANAGEMENT ENGINEER WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS.  THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER. This POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION.

DAILY DUTIES / RESPONSIBILITIES:
IDENTITY AND ACCESS MANAGEMENT – ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI-FACTOR AUTHENTICATION, ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
• RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
• RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
• DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
• ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES

REQUIRED SKILLS (RANKED IN ORDER OF IMPORTANCE);

  • FIVE YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
  • FIVE YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
  • CYBER SECURITY AWARENESS AND UNDERSTANDING
  • FIVE YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
  • FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
PREFERRED SKILLS (RANKED IN ORDER OF IMPORTANCE):
  • SIEM ANALYSIS AND REPORTING
  • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
  • APPLICATION SECURITY (APPSEC)
REQUIRED EDUCATION:
  • BACHELOR'S DEGREE IN ANINFORMATION TECHNOLOGY ORINFORMATION SECURITY RELATED FIELD
  • EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
Preferred Education/Certifications:
  • CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
  • ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
  • VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.


About Vector:
Vector Consulting, Inc., (Headquartered in Atlanta) is an IT Talent Acquisition Solutions firm committed to delivering results. Since our founding in 1990, we have been partnering with our customers, understanding their business, and developing solutions with a commitment to quality, reliability and value. Our continuing growth has been and continues to be built around successful relationships that are based on our organization's operating philosophy and commitment to ** People, Partnerships, Purpose and Performance - THE VECTOR WAY


“Celebrating 30 years of service.”
#LI-RS1

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.