Senior Cyber Security Architect - Consultant - 4 Days Remote and 1 Day Onsite a Week

Overview

On Site
$$85/hr on W2
Contract - W2
Contract - Independent
Contract - 31 day((s))

Skills

Python
LINUX
deployment
Security
windows
BASH
Automation
logging
Cyber
Reports
Access
control
IDENTITY

Job Details

The State of South Carolina Department of Admin is looking for - Security Architect - Consultant
Why is this position open: This is a repost of posting 8404 as the resource selected is unable to move forward. This is a new role supporting identity and access management and security automation.
Interview Process: 1-2 interview rounds that will take place ONSITE.
Duration of the Contract: 12 Months
Possibility for Extension: Yes

Candidate Location: Candidate must be a CURRENT resident in the Columbia, SC area. Candidates local to Columbia are highly preferred however the manager is open to accepting resources within 125 miles from the zip code 29118 that will relocate to Columbia at the start of the role at their own expense. (Candidates outside of this area will not be considered). No relocation allowed.
Job describtion:

Daily Duties / Responsibilities:

PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID OVER FULL-TIME REMOTE (ON-SITE AS NEEDED)

  • IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI-FACTOR AUTHENTICATION, ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
  • RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
  • Responsible for planning, designing, development and implementation of enterprise security solutions that align with business goals and risk tolerance.
  • Design, deploy and manage countermeasures to known security threats and develop preventative mitigation strategies for new and emergent threats to enterprise data, networks and associated services.
  • Ensure, validate and measure the consistent application of protective measures throughout the enterprise business application and infrastructure support environments. Take appropriate action to protect state data and technology services.

Required Skills (rank in order of Importance):

  • FIVE YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
  • FIVE YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
  • CYBER SECURITY AWARENESS AND UNDERSTANDING
  • FIVE YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
  • FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS

Preferred Skills (rank in order of Importance):

  • SIEM ANALYSIS AND REPORTING
  • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
  • APPLICATION SECURITY (APPSEC)

Required Education/Certifications:

BACHELOR'S DEGREE IN AN

INFORMATION TECHNOLOGY OR

INFORMATION SECURITY RELATED

FIELD

EIGHT YEARS OF RELEVANT WORK

EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION

Preferred Education/Certifications:

  • CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
  • ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
  • VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.

Interview Process (phone, video or in-person, how many rounds of i/v's, etc)?

INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS

PREFERRED BEFORE FINAL SELECTION

Interview Availability: How soon can you schedule an interview (date / times)?

ASAP after posting closes and resumes are received and reviewed

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.