US|ARCHITECT

Overview

On Site
Full Time

Skills

SSO
Cross-functional team
Security architecture
Identity management
Use cases
Risk management
Incident management
Virtual directory
IT security
Software security
Thought leadership
Information security
ISO/IEC 27001:2005
Data centers
Patch Management
Network security
FOCUS
Design
Cloud computing
Leadership
Management
Roadmaps
Testing
Authentication
Authorization
Multi-factor authentication
Provisioning
Analytics
Governance
Mentorship
Cyber security
Honesty
Delegation
Coaching
OAuth
OIDC
RACF
SAML
LDAP
API
National Institute of Standards and Technology
Planning
Workflow
Microsoft Windows
Linux
Firewall
Proxies
WAF
RDMS
Communication

Job Details

Location: Coppell, TX
Salary: Negotiable
Description: Our client is currently seeking a US|ARCHITECT

Title : IAM Architect / Security Architect / Architect

Location: Dallas , TX | Tampa , FL - 3 Days Onsite (Hybrid)

Contract :6+ Months , contract - possibility of extension or conversion

Job Description:

Position Summary

  • The primary focus areas for this position are the following:
  • Produce security architecture deliverables as part of initiatives related to certificate services and identity and access management.
  • Partner with IT teams to design and deliver architectures to enable federated access and single sign on in cloud and hybrid environments.
  • Proactively identify security gaps, propose solutions, and follow through with engineering teams for implementation.
  • Innovate and lead others to solve complex issues.


Your Responsibilities
  • Drive the Identity & Access Management and secrets management architecture roadmap and share with AES stakeholders.
  • Participate in discovery workshops to understand clients & Workforce IAM and security needs and provide best practice recommendations to meet IAM use cases. Develop design and architectural diagrams that clearly communicate the proposed solution and flows.
  • Actively participate in the cross-functional team meeting, developing project plans, implementation, testing, pre / post go-live activities, risk management and issue management.
  • Architect solutions utilizing Ping Identity Products, PlainID and/or similar IAM products, such as IGA tools, Virtual Directory, PAM and Secret Management solutions.
  • Create IT security standards easily consumed by stakeholders.
  • Evaluate the existing application security controls, (on-premises and cloud), identify improvements, and build plans into the application security capability roadmap for implementation.
  • Build access management security patterns (standardizing authentication/authorization flows, single-sign-on/MFA, provisioning, user behavior analytics, access governance system controls, privileged/secrets mgt) and designs as part of initiatives to modernize the access management security posture.
  • Mentor junior security engineers and architects to enhance their cybersecurity and architecture skills.
  • Maintain professional and technical process knowledge by keeping abreast of the changing security landscape within the technology industry and changes in cybersecurity frameworks.
  • Create white papers and present in industry conferences to display thought leadership in the security field.
  • Align risk and control processes into day-to-day responsibilities to monitor and mitigate risk; escalates appropriately.

Leadership Competencies for this level include
  • Feedback: Seeks feedback from others, provides feedback to others in support of their development, and is open and honest while dealing constructively with criticism.
  • Delegating: Effectively manages tasks and people, taking a practical approach to determine the most effective method of execution while respecting others? expertise and considering others? feelings and working styles.
  • Inclusive Leadership: Values individuals and embraces diversity by integrating differences and promoting diversity and inclusion across teams and functions.
  • Coaching: Understands and anticipates people's needs, skills, and abilities, in order to coach, motivate and empower them for success.

Qualifications
  • 8-10 years of related experience
  • Bachelor? S degree preferred.

Specific Skills & Technologies
  • Strong cybersecurity experience in architecting implementations using Ping Identity products (especially PingFed, PingOne, PingID, and PingAuthorize) is required.
  • Experience with most standard IAM security protocols (Eg: OAuth, OIDC, RACF, SAML, LDAP, ID Federation, SSO, MFA, UEBA) is required.
  • Experience architecting solution using products like API Gateway, IGA and Virtual Directory is required.
  • Strong experience in identifying access management control gaps.
  • Experience with Information Security frameworks (e.g., ISO 27001, CIS, MITRE ATT&K and NIST) & security architecture frameworks
  • Experience architecting automated data centre processes, including provisioning, application, and patch management, monitoring and alerting, capacity monitoring and planning, leveraging execution and human approval workflow design and implementation.
  • Experience in OS security (Windows, Linux), Network security (Firewall, Proxy, WAF) and RDMS is preferred.
  • Strong communication skills with the ability to present in front of large audience.


Contact:

This job and many more are available through The Judge Group. Please apply with us today!

About Judge Group, Inc.