Job Description: The client is seeking a Senior Security Architect to serve the client leadership in the domains of Application Data and Technology Security through the development of architecture patterns briefs reports and targeted security risk analyses.
Assist teams on initiatives providing tactical and architectural considerations on legacy solutions
Evaluate new implementations while navigating a complex organizational environment with diverse stakeholders to accurately present the scenario and present sound analyses and recommendations with steps for approval and implementation
Manage a body of work independently leveraging available process documentation templates systems and resources.
Assist in issue resolution communicating concerns effectively to the right personnel operationalizing Security Architecture practices and extending the scope of client Governance & Security Architecture.
Create and socialize clear impactful and polished architecture artifacts such as:
Standards and guidelines
Management Briefs
Security Training
Updated processes
Knowledge Base articles
PowerPoints
Visio Process Diagrams
PowerBI Dashboards
Excel Reports
Collaborate with Business areas and cross- functional Enterprise Architects to fully understand business needs and provide strategic consultation on data security and risk-averse implementation.
Perform tasks related to Security Compliance and Control Evaluation Risk analysis and exception documentation.
Support Vulnerability Management by ensuring VM data quality and ingestion for remediation team execution.
Integrate Security into Architecture Roadmaps by developing artifacts and ensuring other architects roadmaps contain integral security measures and best practices.
Research and share findings of architecture governance controls and peer review processes and projects with regards to platform technology security and cloud.
Document process diagrams and script narratives/executive summaries.
Create Business focused documentation for diverse technical audiences.
Research and provide written guidance on alignment with security policies/standards.
Partner with architects other technical team members and to develop roadmaps and strategies to support agency KPIs
Qualifications:
State/Industry experience in information security and IT risk management with a focus on security performance and reliability.
Federal/State compliance & standards alignment experience reviewing proposed changes for programs and projects.
Policy Development experience utilizing and presentation of information security architecture policies standards and procedures
Monitoring information security compliance experience with information security architecture policies and standards.
Information security framework experience like NIST 800 Series CSF & COBIT.
Substantial technical expertise in at least two areas:
Cloud technologies
Identity & access management (IAM)
Vulnerability Management
Firewalls
Computer Forensic Techniques
Databases
Collaboration Tools
Web & Mail Services
Security direction and design inputs experience with information security capabilities and strategic technology alternatives.
Communication & collaboration experience with excellent written and oral communication and presentation skills and the ability to simplify technical terms and collaborate with diverse personnel.
Demonstrated experience working with a broad cross-section of personal including all levels of management and external entities such as client consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with the Office of Information Security
Fast-Paced environment experience with experience acquiring new skills/knowledge to meet customer needs.
Customer perspective experience understanding IT customers priorities and the business criticality of platforms applications and services.
Skills:
Skill
Required / Desired
Amount
of Experience
Knowledge and application of security best practices
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.