[Close] 

IT Security Architect

Live IT Up at Ciber Global   At Ciber Global, we believe the most inspired, innovative and industrious companies should win, regardless of size or legacy. We're the small company that cares and the big company that can. We deliver breakthrough performances and powerful solutions that are anything but cookie cutter in order to give our clients the competitive advantage they deserve.   Work.   Ciber Global is currently seeking an experienced IT Security Architect  The selected candidate will be Responsible for establishing the target security/infrastructure architecture for security platforms. Responsibilities Acts as consultant and subject matter expert to leadership and project sponsor in defining the vision, objective and scope of major security related work projects and programs. Consults with project delivery teams and solution providers to implement security architecture frameworks and solutions. Consults and researches with vendor product specialists/sales, independent research organizations, on-site support engineers and fellow architects and administrators on best-fit technologies and also ensure compliance to department policies & standards and technology roadmap. Coordinate with Enterprise Architecture team for technology validation or suggestions for alternative solutions. If necessary, initiate Solution Assessments, Infrastructure Service Requests, and any applicable required documentation to implement the new technology. Advocates the use of emerging cyber security best practices, technologies, developing standards and procedures, promoting the usage of automated tools, developing strategies, and aligning practices with strategic initiatives. Authors requirements, including definition of dependencies on infrastructure consolidation efforts. Authors design related artifacts (Functional Design, System Design and Security Architecture) Produce architectural framework documents i.e., white papers, guidance documents, best practices, technical reports, etc. Performs security architecture and general security reviews for new infrastructure and system implementations Define Security/Information Assurance requirements (and dependencies). Specify key architectural aspects of the architecture view and identify other aspects that need definition.  Project contributor representing security and participates in project plan development Provides project estimates based on past experience with security implementation-based projects and programs Leverage broad-based understanding of technology areas and end-to-end knowledge of current installations to craft architectural solutions or standards that can be applied across the enterprise. Operate within the context of the Client - State Unified IT Environment (SUITE) process methodology. Provide strategic and architectural support for cyber Security as a Subject Matter Expert. Provide support and subject matter expertise with respect to adherence to security controls (e.g. NIST 800, CIS, and related) Provide support and subject matter expertise with respect to adherence to Enterprise Architecture Frameworks (e.g. TOGAF or related)  Qualification Experience in large, complex information technology environments - Required  Practical experience in a mature Information Security organization - Required Practical experience consulting with project teams and solution providers - Required Demonstrates practical experience and in-depth knowledge of security controls (e.g. NIST and CIS Top 20 and related) - Required Demonstrates practical experience and in-depth knowledge of security frameworks (e.g. ISO27001 - Required Demonstrates practical experience and in-depth knowledge of regulatory security controls (e.g. PCI, HIPAA, CJIS, FISMA) - Desired  Demonstrates practical experience in Enterprise Architecture Frameworks such as TOGAF or related - Required Demonstrates practical experience in networking - Required Demonstrates practical experience in application security - Required Demonstrates practical experience in application security - Required Demonstrates practical experience in Identity and access management (IAM) - Required Experience working with current and emerging information security technologies - Highly desired Experience working with current and emerging development methodologies - Desired  Experience working with current and emerging development methodologies - Required Bachelor's Degree in Computer Science, Information Systems or Engineering - Required 202194
Salary Range: NA
Minimum Qualification
Not Specified years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.