Job Description :
Please contact your "eDataForce " recruiter (Ms. TAS) for immediate consideration.
===============================

REQUIREMENT:

Security Architects are expected to have at least 5-10 years of relevant IT experience, including exposure to business planning, systems analysis and application development. 3-5 of those years which have been devoted specifically to security.

Minimum Qualifications:

Bachelor’s degree in Computer Science, Information Systems, Information Assurance or related field. Candidate should have 5 or more years’ experience with the following:

A Master’s degree in an IT field, or Master’s in Cybersecurity is a plus

Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
Identity and access management (IAM) – the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies, ISO 27001/27002, ITIL and COBIT frameworks
Windows, UNIX and Linux operating systems
Perimeter security controls – firewall, IDS/IPS, network access control and network segmentation
Router, switch and VLAN security; wireless security
Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
Practices and methods of IT strategy, enterprise architecture and security architecture
Network security architecture development and definition
Knowledge of third party auditing and cloud risk assessment methodologies
The duties outline the tasks and goals for which the information security architect is responsible. That may vary depending on the County’s needs or industry. On any given day, you may be challenged to:
Design, build and implement enterprise-class security systems for a production environment
Align standards, frameworks and security with overall business and technology strategy
Identify and communicate current and emerging security threats
Design security architecture elements to mitigate threats as they emerge
Create solutions that balance business requirements with information and cyber security requirements
Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
Train users in implementation or conversion of systems
Recommend modifications in legal, technical and regulatory areas that affect IT security
Preferred Certifications- One or more of the following:
CISSP: Certified Information Systems Security Professional
CISSP-ISSAP: Information Systems Security Architecture Professional
CISM: Certified Information Security Manager
CEH: Certified Ethical Hacker
CSSA: Certified SCADA Security Architect
GSEC / GCIH / GCIA: GIAC Security Certifications


Excellent Communication is a MUST
             

Similar Jobs you may be interested in ..