Senior Enterprise Security Architect (IAM Architect) - Hybrid

Overview

Hybrid
Depends on Experience
Contract - W2
Contract - Independent
Contract - 12 Month(s)

Skills

JIRA
Smart Grid
VPN
assessments
authentication
cryptography
cyber security
interpersonal
risk assessment
planning
testing security solutions
vulnerability
strategy
IT risks
risk assessment certifications
Cybersecurity Review Board
Cybersecurity
DGM
Enterprise Architect
Primary Enterprise Architect

Job Details

Position: Senior Enterprise Security Architect (IAM Architect)

Location: Dallas, TX - Hybrid

Duration: 1 Year

Rate: $ Open/Hour

Summary

This position is responsible for planning, designing, building, and testing security solutions and capabilities within Client s Technology Organization. By identifying areas of weakness, staying up to date with the latest security standards, and having a thorough understanding of Client s IT systems, the security architect identifies possible security threats to prevent a cyber breach.

Additionally, this position works cooperatively with a team that develops concepts, strategy and tactical processes into changing grid operations and landscapes.

Key Roles & Responsibilities (other duties may be assigned)

This position encompasses the following responsibilities directly or through others:

Enterprise Architect Team:

Participate in the Architecture Review Board (ARB) including:

Participate in discussion and approval of all projects, procedures, and policies presented to the ARB

Approve of security-focused project designs that can be approved outside the ARB

Validate and prepare security-focused projects, designs, procedures, or processes prior to them being presented to the ARB

Participate in Enterprise Solution Review Board

Ensure that proposed solutions align with Enterprise Architecture Strategies

Speak to the collaborative design of the solution and key decisions made for the design

Work with security teams from Cybersecurity, DGM, and Smart Grid Capabilities to create, maintain & enforce the Enterprise Architecture Strategies & Guidelines for areas including, but not limited to:

Application Security

Network Security

Virtual Private Networks (VPN)

Identity and Access Management

Data Security

Cloud Security

Critical Infrastructure Protection (CIP) Systems

Transient Devices

Control System Security

Cyber Security Monitoring and Protection solutions

Encryption

Create and/or validate the security elements of a design for projects a fellow Enterprise Architect is the primary architect on

Participate in vendor and product selection process on security focused and non-security focused initiatives

Participate in the validation and approval of submissions of PC Order Software Request JIRA process by approving software requests which require a specific security focused architectural review

Participate in the Technology Strategy team Product Roadmap Initiative by providing recommendations for new products, consolidation, prioritization, decommission, implementation timing and dependencies

Perform role of Primary Enterprise Architect to assigned projects & efforts within the following capabilities:

Cybersecurity, DGM, and Smart Grid

For assigned projects & efforts:

Integrate with technology capability project teams to:

Assist with high-level and low-level designs

Ensure architecture guidelines & policies are followed

Ensure industry best practices are followed

Ensure regulatory, legal or policy requirements are followed

Formulate acceptable processes and use cases

Ensure solution will deliver all functional & non-functional requirements

Ensure solution allows Client to remain cyber safe & secure

Validate design vs. as built architecture at the completion of projects

Participate in the open form discussions around changing threat landscape, evaluate risk and provide recommended changes to defense postures.

Technology Capability Teams:

Provide guidance, troubleshooting, and recommendations during the design, build and implementation of security systems and controls within Client s IT and Industrial Control networks

Understand, share, advise and recommend on associated cybersecurity standards, systems and authentication protocols, cybersecurity working groups and current cybersecurity best practices / processes

Proactively identify and document cybersecurity design gaps in existing and proposed architecture. Recommend changes or enhancements in accordance with enterprise strategy, cybersecurity standards, frameworks and best practices

Participate in Cybersecurity Review Board(s)

Participate in security-related incidents as needed and provide input and guidance on post-event analysis

Review, modify and/or approve all Security Questionnaire submissions

Review and document changes or modifications of cybersecurity technical guidelines/procedures/ policies related to projects or efforts

Actively engage in vulnerability assessments and provides recommended mitigations or actions

Participate in the development of cyber awareness programs and delivery

Review system requirements and logging needs for new and existing projects or efforts in accordance with Client s logging standard and needs

Review application scan outputs on systems and their code for security risk and provide recommended solutions

Experience, Qualifications, & Skill Requirements

15 or more years experience in IT risk management and information security

IT security or risk assessment certifications are advantageous

Strong working knowledge of IT risks, cyber security, and computer operating software

Advanced understanding of security protocols, cryptography, and security

Great communication and interpersonal skills

Experience implementing security solutions

Comfortable working on a team

Measures of Success

Ability to self-initiate projects, analyze, and deliver strategic cybersecurity assessments / recommendations on time and within budget

Intellectually curious and takes a pro active approach to solving problems or answering strategic questions

Sought after by peers and Client leaders for expertise and leadership within cybersecurity

Please send your resume in word format to following details to , or call me @

Name in Full:

Contact Details:

Email ID:

Current Location:

Relocation:

Availability:

Expected Salary:

Work Authorization:

LinkedIn Profile:

DOB (MM/DD):

Zip Code:

Skype ID:

Employer Details if Any: