NOTE : W2 ONLY!! No C2C
Role: IDENTITY AND ACCESS MANAGEMENT Security Architect
Location: Columbia SC Onsite Must relocate
Duration of the Contract: 12 Months
Possibility for Extension: Yes
Interview Process: INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS PREFERRED BEFORE FINAL SELECTION
25% Hybrid schedule to be determined by manager.
Candidate Location: Open to Nationwide US candidates must be willing to relocate to SC prior to
W2 ONLY!! No C2C
Key duties and Responsibilities
PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID .
IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT SINGLE SIGN ON MULTI-FACTOR AUTHENTICATION ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
RESPONSIBLE FOR PLANNING DESIGNING DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
DESIGN DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA NETWORKS AND ASSOCIATED SERVICES.
ENSURE VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
Required Skills
5 YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL LOGGING AND REPORTING SYSTEMS
5 YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
5 YEARS OF EXPERIENCE WITH LINUX WINDOWS NETWORK SECURITY PROTOCOLS AND PROCEDURES
5 YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
Preferred Skills
SIEM ANALYSIS AND REPORTING
SECURITY FRAMEWORKS: NIST CSF CJIS IRS 1075 CMS MARS-E
APPLICATION SECURITY (APPSEC)
Education Requirement
BACHELORS DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD OR EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
NOTE : W2 ONLY!! No C2C Role: IDENTITY AND ACCESS MANAGEMENT Security Architect Location: Columbia SC Onsite Must relocate Duration of the Contract: 12 Months Possibility for Extension: Yes Interview Process: INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVI...
NOTE : W2 ONLY!! No C2C
Role: IDENTITY AND ACCESS MANAGEMENT Security Architect
Location: Columbia SC Onsite Must relocate
Duration of the Contract: 12 Months
Possibility for Extension: Yes
Interview Process: INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS PREFERRED BEFORE FINAL SELECTION
25% Hybrid schedule to be determined by manager.
Candidate Location: Open to Nationwide US candidates must be willing to relocate to SC prior to
W2 ONLY!! No C2C
Key duties and Responsibilities
PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID .
IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT SINGLE SIGN ON MULTI-FACTOR AUTHENTICATION ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
RESPONSIBLE FOR PLANNING DESIGNING DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
DESIGN DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA NETWORKS AND ASSOCIATED SERVICES.
ENSURE VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
Required Skills
5 YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL LOGGING AND REPORTING SYSTEMS
5 YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
5 YEARS OF EXPERIENCE WITH LINUX WINDOWS NETWORK SECURITY PROTOCOLS AND PROCEDURES
5 YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
Preferred Skills
SIEM ANALYSIS AND REPORTING
SECURITY FRAMEWORKS: NIST CSF CJIS IRS 1075 CMS MARS-E
APPLICATION SECURITY (APPSEC)
Education Requirement
BACHELORS DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD OR EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
View more
View less