Clover Consulting has a large, direct client in Grand Rapids, MI in need of a IT Security Architect. This is a long term contract or CONTRACT TO HIRE position.
The Security Architect is a senior-level employee responsible to plan, analyze, design, configure, test, implement, maintain and support an organization s computer and network security infrastructure that is responsive to changes in regulations and risk. This requires knowing the business a comprehensive awareness of its technology and information needs which is used to develop and test security structures to protect its systems.
Key duties include:
- Design, build and implement enterprise-class security systems for a production environment
- Align standards, frameworks and security with overall business and technology strategy
- Identify and communicate current and emerging security threats
- Design security architecture elements to mitigate threats as they emerge
- Create solutions that balance business requirements with information and cyber security requirements
- Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
- Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
- Train users in implementation or conversion of systems
Key technical skills and competencies include:
Five or more years experience in:
- Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
- Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
- Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
- Identity and access management (IAM) the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
Experience with and knowledge of:
- NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle. These are some of the technical elements needed to build security into an organization.
- Relevant National Institute of Standards and Technology (NIST) standards. A system that is not in compliance with the standards set by NIST, along with ISO27001, COBIT and COSO (below), will lack both compliance and adequate security architecture.
- ISO27001 specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s risk management
- Control Objectives for Information and Related Technologies (COBIT)
- Committee of Sponsoring Organizations (COSO) of the Treadway Commission, a joint initiative to combat corporate fraud
- Windows, UNIX and mainframe
General skills include:
- Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
- Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
- Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
- The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background
Certification requirements are one or more of the following:
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Information Systems Security Architecture Professional (ISSAP)
- Information Systems Security Engineering Professional (ISSEP)
- SANS-related certifications Education requirements can vary, but most require a BA or BS in information security, engineering, mathematics, or related area. A Master s degree in an IT field is a plus, and a Master s in cybersecurity is an even bigger plus.
Qualified candidates please apply with resume.