drjobs Platform Security Architect (Hybrid)

Platform Security Architect (Hybrid)

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Richmond - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: Platform Security Architect (Hybrid)

Location: Richmond VA

Duration: 12 Months

Job Description:

The Platform Security Architect is a critical technical role responsible for ensuring the secure design and compliance of the platforms enterprise architecture. The Platform Security Architect will assist in ensuring systems complete needed steps in order to receive Authority to Operate including but not limited to architectural design System Security Plan and compliance with organization design patterns to effectively and securely support the organization in meeting specific business technology needs. This candidate will be considered a technical expert. Ideal candidates will have the following expectations execute architecture design reviews to evaluate security controls and identify opportunities to enhance the security posture of the Commonwealths Platform services build relationships with supplier infrastructure architects and engineering leads to disseminate and explain secure design methodologies and policies. Ideal candidates will also understand the landscape and components of cutting-edge architectures and the methods to securely deploy them.

Duties/Responsibilities:

  • As part of a team ensure the adoption of security architecture and engineering initiatives in order to effectively and securely support the organization in meeting specific business technology needs.
  • Review solutions to be deployed in cloud and on premise environments
  • Assist with Architectural design documentation and System Security Plan documentation
  • Monitor and guide systems to ensure Authority to Operate is achieved in a timely manner
  • Understand technical security issues and the implications to the Platform and be able to communicate them to management and other business leaders.
  • Responsible for guiding the design and implementation of secure solutions and services across the Platform.
  • Maintain in-depth knowledge of IT Industry best practices technologies architectures and emerging technologies.
  • Must have knowledge and understanding to be able to configure and implement security solutions to reduce risk to an acceptable level.
  • Understand emerging security technologies and determine the appropriate use within business applications.
  • Must be able to provide technical guidance and foster a collective understanding of data flows and security issues encountered in both premise based and cloud applications and services.
  • Communicate architectural decisions plans goals and strategies
  • Must be able to incorporate business drivers needs and strategies to address future business / technology needs.
  • Work in teams for secure application and/or infrastructure solution architecture.
  • Collaborate with our Governance organization and functions including Internal Audit Legal and Compliance Privacy and Sourcing to ensure that the Platform maintains a strong cybersecurity posture.

Skills:

Skill

Required / Desired

Amount

of Experience

Experience providing high-level design and architecture diagrams

Required

8

Years

technically validating solutions and connecting business data security systems and other technical and non-technical architectures

Required

8

Years

Familiarity with open architecture and cybersecurity architecture principles that achieve cybersecurity framework goals.

Required

8

Years

Familiar with encryption technologies used in commercial operating systems including Public Key Infrastructures-continued

Required

8

Years

symmetric and asymmetric cryptography certificate trust stores and the use of key escrow for discovery and legal purposes

Required

8

Years

At least 8 years of experience in network and endpoint security architecture

Required

8

Years

Familiarity with protocols commonly used in commercial networks such as SMB RPC HTTP SQL

Required

8

Years

Familiar with multi-tiered network applications common ports and protocols used in those communications

Required

8

Years

Familiar with Vulnerability Scoring (CVSS) and exploitation mechanisms of common vulnerability types (overflows cross-site-scripting SQL injection)

Required

8

Years

Experience working with Cloud Native architecture paradigms patterns and security methodologies.

Required

6

Years

Familiarity with NIST IRS 1075 HIPAA FedRAMP and other cybersecurity frameworks

Required

8

Years

Familiar with methodologies for scalable automated creation of System Security Plan and Authority to Operate Attestation & Validation

Required

4

Years

Candidate should have a background in general security practices such as identity and access management (IAM)-continued

Required

8

Years

Experience leading the alignment of on-going activities in support of critical State & Federal mandates such as -continued

Required

8

Years

Continuous Diagnostics and Monitoring (CDM) Executive Orders related to cybersecurity and guidance from OMB and NIST

Required

8

Years

Familiarity with open architecture and cybersecurity architecture principles that achieve cybersecurity framework goals

Required

8

Years

Desired Skills / Certification: AWS Certified Security Azure Architect Certification Google Architect Certification

Desired

Desired Skills/Certs (continued)- Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP)

Desired

Employment Type

Full-time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.