Information Security Architect 3
*ON SITE: Monthly meetings and on site as requested by mgr
*Candidates must be able to be hired directly by the agency without sponsorship. USC’s only811 Commerce Road Staunton, VA 24401Role is 100% remote however if selected candidates will be required to attend monthly meetings onsite in Richmond. For this reason, the preference is for local Richmond candidates.
*This role has the
POTENTIAL to go perm after 6 mo. For this reason candidates must be able to be considered (by the agency) and not need sponsorship. The contractor will still be required to go thru the VITA hiring process if they are interested in being considered for the FTE role with VITA. No guarantees the contractor will be selected for the FTE role.
ABOUT THE ROLE:We are seeking an experienced Information Security Architect to join our IT Security team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services.
Key Responsibilities:· Identify and prioritize critical business functions in collaboration with organizational stakeholders.
· Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
· Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
· Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
· Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Key Skills· Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
· Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
· Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations.
· Ability to map system configuration details to Security Policy Controls.
Please provide me below information:Full Legal Name:Email ID:Contact:Location:Availability:Availability for a WebEx Interview:Work Visa:LinkedIn:Relocation:Updated Resume: In word format only.Pay rate:
Thanks & Regards, | Kumar
OP CONSULTING GROUP LLC |
| |
| |
|
|
|