Job Title: IT Security Architect
Location: Richmond, VA (Remote)
Yakshna Solutions, Inc., (YSI) is a CMMI Level 3 assessed, ISO 9001, 20000:1, 27001 certified, woman-owned small business enterprises, headquartered in Herndon, Virginia, USA. YSI provides professional IT solutions and services to business corporations and government organizations. YSI is committed to serve its business communities as a leading IT vendor providing innovative, quality, and cost-effective IT business solutions and services.
We offer a competitive benefits package that includes the following: 401(k), health, dental, and vision insurance, Life insurance, short-term and long-term disability insurance, paid time off, training, and professional development assistance.
Our Client is seeking an IT Security Architect to join the team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services. The role is 100% remote however, if selected candidates will be required to attend monthly meetings onsite in Richmond.
Key Responsibilities:
- Identify and prioritize critical business functions in collaboration with organizational stakeholders.
- Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
- Evaluate security architecture and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
- Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
- Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Required Skills & Experience
- Knowledge of enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations.
- Ability to map system configuration details to Security Policy Controls.