Cyber Security Architect (Fulltime on client's w2. remote role) CISSP certification reqd

Apply for this position Please mention DailyRemote when applying
Posted 8 days ago United States Salary undisclosed
Before you apply - make sure the job is legit.

Attempting to apply for jobs might take you off this site to a different website not owned by us. Any consequence as a result for attempting to apply for jobs is strictly at your own risk and we assume no liability.

Job Description

THERE'S A PREFERENCE TO BE LOCATED OUT OF NJ, BUT END CUSTOMER COULD BE OPEN TO ANYONE ON THE EAST COAST. THEY CAN WORK REMOTELY WITH THE OCCASIONAL TRIP TO NEW JERSEY. CISSP CERTIFICATION IS REQUIRED

The cybersecurity architect plays an integral role in defining and assessing the client's security strategy, architecture, and practices. The cybersecurity architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services. They will define and execute strategic and tactical plans designed to protect client's most critical IT assets. They will provide information security direction, consultation, design and architectural advice and lead enterprise-wide security initiatives to ensure sustained and reliable security controls. The cybersecurity architect advocates for security requirements and objectives while ensuring that security architectures and practices do not impede the needs of the business. Specifically, the security architect will serve as a technical sounding board for interaction with other line-of-business (LOB) in the organization. The security architect will be expected to evaluate new services, vendors, applications, and security tools from a technical perspective, and to determine the risk characteristics of these activities and functions.

Responsibilities:

  • Develop a complete understanding of client's technology and information systems
  • Design, build, implement and support enterprise-class security systems
  • Align organizational security strategy and infrastructure with overall business and technology strategy
  • Identify and communicate current and emerging security threats
  • Design security architecture elements to mitigate threats as they emerge
  • Develop and maintain security architecture artifacts (e.g., models, templates, standards, and procedures) that can be used to leverage security capabilities in projects and operations
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Determine baseline security configuration standards for operating systems and network segmentation
  • Develops standards and practices for data encryption and tokenization in the organization
  • Perform vulnerability testing, risk analyses and security assessments
  • Create solutions that balance business requirements with information and cybersecurity requirements
  • Validates IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable
  • Validates security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems
  • Conducts or facilitate threat modeling of services and applications that tie to the risk and data associated with the service or application
  • Ensures a complete, accurate and valid inventory of all systems, infrastructure and applications that should be logged by the security information and event management (SIEM) or log management tool
  • Coordinates with the compliance manager to document data flows of sensitive information in the organization
  • Reviews network segmentation to ensure least privilege for network access
  • Supports the testing and validation of internal security controls, as directed by the Director of Security and Compliance or the internal audit team
  • Coordinates with operational and facility management teams to assess the security of operational technology (OT) and Internet of Things (IoT) systems
  • Test security systems to ensure they behave as expected
  • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
  • Provide supervision and guidance to the security team
  • Define, implement and maintain corporate security policies and procedures
  • Train users in implementation or conversion of systems
  • Respond immediately to security-related incidents and provide thorough remedial solutions and analysis
  • Liaises with the vendor management team to conduct security assessments of existing and prospective vendors
  • Regularly communicate vital information, security needs and priorities to upper management

Required and Preferred Knowledge, Skills, and Abilities:

  • Minimum Education required - Bachelor's degree in Information Systems or equivalent experience required.
  • Minimum Experience required 5-7 years of IT security experience
  • Professional Qualification such as CISSP preferred
  • Experience with common information security management frameworks, such as ISO 2700X and NIST.
  • Demonstrated ability leading security-based project.
  • Must have technical competency in IT/Systems, combined with business acumen to understand and translate between business and technical requirements.
  • Experience and strong understanding of security tools/technologies and working with legal, audit and compliance staff.
  • Able to support multiple efforts in parallel, in a highly matrix, fast-paced, multi-site organization experiencing rapid growth
  • Experience in system technology security testing (vulnerability scanning and penetration testing) and familiarity with applicable legal and regulatory requirements (SOX, CCPA, PCI DSS)
  • Proficient in performing risk, business impact, control and vulnerability assessments, and in defining treatment strategies.
  • An understanding of operating system internals and network protocols with familiarity of the principles of cryptography and cryptanalysis.
  • Experience in developing and documenting security architecture, policies, procedures, standards, guidelines and plans, including strategic, tactical and project plans.
  • Strong interpersonal skills required, with a positive approach to collaboration and relationship building.
  • Must have excellent written and verbal communication skills.
  • Strong analytical, organizational and demonstrated problem solving and conflict resolution skills.
  • Must be a self-starter with an attitude to "get things done" and an excellent understanding of information security concepts, protocols, industry best practices and strategies.
  • Travel required to various operating locations along with business-related meetings & conferences.
  • Physical demands include sitting for extended periods of time, standing and walking, bending or stooping, lifting up to 25 pounds frequently and up to 50 pounds on occasion. Lifting equipment such as PC CPU's and monitors and transporting to various locations.

Systems Experience:

Cloud Security - Microsoft Azure

Cisco Meraki/Networking & Cisco ISE

PKI Management/Certificate

Vulnerability Management & Pen Testing

Multifactor Authentication

SSO

CASB

ZeroTrust/Conditional Access

Network segmentation design

Privileged Access Management Solutions

Python/Powershell/JavaScript/Scripting

CDN/Web Application Firewall Management (WAF)

DLP

SIEM (Splunk)

THERE'S A PREFERENCE TO BE LOCATED OUT OF NJ, BUT END CUSTOMER COULD BE OPEN TO ANYONE ON THE EAST COAST. THEY CAN WORK REMOTELY WITH THE OCCASIONAL TRIP TO NEW JERSEY. CISSP CERTIFICATION IS REQUIRED

PLEASE CONTACT KHURRAM AR EXT 109 OR khurram"at"khoj-inc"dot"com

- provided by Dice