Negotiable
Undetermined
Remote
Remote
Summary: The Security Architect - Consultant role focuses on identity and access management within the Information Security division, emphasizing the implementation and operationalization of security technologies. The position requires expertise in information security architecture and solution design to ensure secure planning and implementation of systems. The role is expected to last for 12 months with potential for extension and is fully remote. Key responsibilities include automation development and managing security measures against threats.
Key Responsibilities:
- 100% remote telework.
- Ensure appropriate identity management, single sign-on, multi-factor authentication, and active directory configurations.
- Develop and implement automation for disparate security and enterprise IT tools.
- Plan, design, develop, and implement enterprise security solutions aligned with business goals and risk tolerance.
- Design, deploy, and manage countermeasures to known security threats and develop mitigation strategies for new threats.
- Validate and measure the application of protective measures throughout the enterprise and take action to protect data and technology services.
Key Skills:
- 5+ years of expertise in automation development using tools such as Python and Bash.
- 5+ years of experience with identity and access control, logging, and reporting systems.
- 5+ years of experience in cyber security awareness and understanding.
- 5+ years of experience with Linux, Windows, and network security protocols.
- 5 years of experience in supporting large IT environments and/or system deployments.
- SIEM analysis and reporting.
- Familiarity with security frameworks: NIST, CSF, CJIS, IRS 1075, CMS MARS-E.
- Application security (AppSec).
Salary (Rate): £66.67 hourly
City: undetermined
Country: undetermined
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
SECURITY ARCHITECT - CONSULTANT
SCOPE OF THE PROJECT: THE POSITION WILL WORK AS A SECURITY IDENTITY AND ACCESS MANAGEMENT ENGINEER WITHIN THE DIVISION OF INFORMATION
SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION
WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE
AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A
SECURE MANNER. THIS POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION.
DAILY DUTIES / RESPONSIBILITIES:
- THIS POSITION WILL BE 100% REMOTE TELEWORK.
- IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI-FACTOR AUTHENTICATION, ACTIVE
DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
- RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
- RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK
TOLERANCE.
- DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO
ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
- ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
Required Skills:
- 5+ YEARS OF EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
- 5+ YEARS OF EXPERIENCE WITH EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
- 5+ YEARS OF EXPERIENCE IN CYBER SECURITY AWARENESS AND UNDERSTANDING
- 5+ YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
- FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
- SIEM ANALYSIS AND REPORTING
- SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
- APPLICATION SECURITY (APPSEC)
REQUIRED EDUCATION/CERTIFICATIONS:
- BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD
- EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
PREFERRED EDUCATION/CERTIFICATIONS:
- CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
- ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
- VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.