Job Description :

Please find our client job requirement for your consideration.

Title : Security Architect
Location: Austin, TX 78701
Client :State of TX
Duration: 12 Months

Description: The Department of Information Resources (DIR) requires the services of one Security Architect, hereafter referred to as Worker(s), who meets the general qualifications of a Security Architect Category, Core Technology Type and the specifications outlined in this document for the Lower Colorado River Authority (LCRA

All work products resulting from the project shall be considered “works made for hire” and are the property of the LCRA. LCRA may include pre-selection requirements that potential Vendors (and their Workers) submit to and satisfy criminal background checks as authorized by the Texas law. LCRA will pay no fees for interviews or discussions, which occur during the process of selecting a Worker(s

The Security Architecture team within the LCRA Cybersecurity Department is responsible for defining and communicating the security architecture for information systems at LCRA. The Security Architecture team maintains security controls, defines standards based on the controls, and translates standards into security requirements. Security Architects provide security guidance through information system procurements, design, and implementation.

The selected candidate for the Security Architect position performs activities related to information security, system design, and information system security planning. Works to determine specifications, plans, designs and the development of the information security systems architecture and software solutions, including enterprise level applications, custom integration solutions, and security architecture for critical infrastructure systems. This position utilizes in-depth knowledge and experience in the development of security standards for information systems, procedures, and security architecture designs considering business needs, best practices and regulatory compliance. Takes a new perspective to solve complex problems. Works independently and receives minimal guidance. Acts as a resource for colleagues with less experience. May direct the work of other staff members.
Duties for this position include:
Designs and implements security measures to mitigate technical and business risks.
Creates detailed system security documentation.
Ensures systems have the appropriate security measures across all of the organization’s cyber assets based on the NIST CSF and other applicable frameworks based on system type.
Researches and maintains knowledge in emerging technologies focusing on security risks to the business.
Develops integrated solutions to resolve highly complex technical and business issues.
Designs system architecture for enterprise-wide information systems and processes with an emphasis on information security.
Determines requirements, specifications and designs of information security solutions.
Assists in the design of major system security enhancements, functions and features.
Assists in providing design recommendations based on long-term technology strategy.
Ensures information security systems are properly integrated across business systems.
Ensures technical security solutions comply with NERC CIP and other regulatory requirements, standards and laws.
Performs risk assessments and oversees the even application of security measures.
Participates in security projects with highly technical requirements
Evaluates internet security alerts for possible application to any LCRA information system.
May be required to travel independently or with a small team to various locations (substations, power plants, water systems, etc as scheduled.
This general overview only includes essential functions of the job and does not imply that these are the only duties to be performed by the worker occupying this position. Workers will be required to follow any other job-related instruction and to perform any other job-related duties requested by supervisor or management.

The worker should have experience in cross referencing different frameworks such as NIST CSF, NIST 800-53 rev 4, NIST 800-82 rev 2, and NERC CIP.
Other Special Requirements: All entities replying to this request must be able pass an LCRA background check. In addition, all entities must sign a Confidentiality Agreement for any and all data not available to the general public as a condition of employment.
Terms and Conditions: This position is subject to funding.
Minimum Requirements:
Years Skills/Experience
7 Designing and building secure systems, networks, and infrastructures
7 Defining security standards and reference architectures used to guide technical resources in secure system implementation and configuration
7 Experience with some or all of these security frameworks and standards; NIST CSF, NIST 800-53 rev 4, NIST 800-82 rev 2, and NERC CIP.
7 Experience working with Enterprise Technology Architects and service matter experts within different business areas
7 Communicating technical and design information effectively in both written and verbal formats

Years Skills/Experience
CISSP, GIAC, or similar certification
Advanced Knowledge of business continuity planning and disaster recovery
Advanced Knowledge of technology hardware and software platforms and systems
Advanced Skill in analytical and technical documentation
Advanced Skill in verbal and written communication
Advanced Skill in articulating complex, technical information to both technical and non-technical audiences
Advanced Skill in understanding complex systems across diverse technical platforms
Advanced skill level in analyzing and solving complex problems
Advanced Ability to analyze significant volumes of detailed information and understanding the security implications
Advanced Ability to work in a team environment
Advanced Experience in developing audit response documentation

If interest Please provide me below information:
Full Name:
Email ID:
Passport No :
Last 4 digit SSNO:
Availability for Interview:
Visa Status:
Visa Expiry date (MM/DD/YYYY):
LinkedIn ID :
Professional Reference :1
Full Name :
Company Name :
Title :
Telephone :
Email id :
Professional Reference :2
Full Name :
Company Name :
Title :
Telephone :
Email id :