[Close] 

IT Security Analyst

Position Title: IT Security Analyst Position Number: 298876 Location: Dimondale, MI Desired Skill Set: System Design, HIPAA, Implementation, cybersecurity Position Description: C2C and STEM-OPT are not available Only U.S. Citizens and those authorized to work in the U.S. can be considered as W2 candidates. Role: IT Security Architect 2 Start Date: 11/12/2018 End Date: 11/11/2019 Location: Dimondale, MI 48821 Short Description: Cloud Security Architect reporting into the client Cyber Security department with dotted line reporting relationship to client Enterprise Architecture department. Responsible for the securityarchitecture for Cloud, IaaS, tenant platforms. Complete Description: Years of Experience: o 7+ years of experience in securityarchitecture o 10+ years of experience in information security (engineering, analyst, incident response) o 10+ years of experienceworking with computer systems o 10+ years of experienceworking withnetwork software and hardware, data or voice as well as experience with open and proprietary software and hardware Job Description: o Establish the target security/infrastructurearchitecture for security platforms. o Acts as consultant and subject matter expert to leadership and project sponsor in defining the vision, objective and scope of major security related work projects and programs. o Consults with project delivery teams and solution providers to implement securityarchitecture frameworks and solutions. o Consults and researches with vendor product specialists/sales, independent research organizations, on-site support engineers and fellow architects and administrators on best-fit technologies and also ensure compliance to department policies & standards and technology roadmap. o Coordinate with Enterprise Architecture team for technology validation or suggestions for alternative solutions. If necessary, initiate Solution Assessments, Infrastructure Service Requests, and any applicable required documentation to implement the new technology. o Advocates the use of emerging cybersecurity best practices, technologies, developing standards and procedures, promoting the usage of automated tools, developing strategies, and aligning practices with strategic initiatives. o Authors requirements, including definition of dependencies on infrastructure consolidation efforts. o Authors design related artifacts (Functional Design, System Design, Security Architecture) o Produce architectural framework documents i.e., white papers, guidance documents, best practices, technical reports, etc. o Performs securityarchitecture and general security reviews for new infrastructure and system implementations o Define Security/Information Assurance requirements (and dependencies). o Specify key architectural aspects of the architecture view and identify other aspects that need definition.  o Project contributor representing security and participates in project plan development o Provides project estimates based on past experience with security implementation-based projects and programs o Leverage broad-based understanding of technology areas and end-to-end knowledge of current installations to craft architectural solutions or standards that can be applied across the enterprise. o Operate within the context of the State of Michigan - State Unified IT Environment (SUITE) process methodology. o Provide strategic and architectural support for cyber Security as a Subject Matter Expert. o Provide support and subject matter expertise with respect to adherence to security controls (e.g. NIST 800, CIS, and related) o Provide support and subject matter expertise with respect to adherence to Enterprise Architecture Frameworks (e.g. TOGAF or related) Skills: o Experience in large, complex information technology environments Required 10 Years o Practical experience in a mature Information Security organization Required 10 Years o Practical experience consulting with project teams and solution providers Required 8 Years o Demonstrates practical experience and in-depth knowledge of security controls (e.g. NIST and CIS Top 20 and related) Required 5 Years o Demonstrates practical experience and in-depth knowledge of security frameworks (e.g. ISO27001 Required 5 Years o Demonstrates practical experience and in-depth knowledge of regulatory security controls (e.g. PCI, HIPAA, CJIS, FISMA) Desired 5 Years o Demonstrates practical experience in Enterprise Architecture Frameworks such as TOGAF or related Required 5 Years o Demonstrates practical experience in networking Required 5 Years o Demonstrates practical experience in application security Required 5 Years o Demonstrates practical experience in application security Required 5 Years o Demonstrates practical experience in Identity and access management (IAM) Required 5 Years o Experience working with current and emerging information security technologies Highly desired 5 Years o Experience working with current and emerging development methodologies Desired 4 Years o Experience working with current and emerging development methodologies Required 5 Years o Bachelors Degree in Computer Science, Information Systems or Engineering Required 4 Years Rose International is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender (expression or identity), national origin, arrest and conviction records, disability, veteran status or any other characteristic protected by law. Positions located in San Francisco and Los Angeles, California will be administered in accordance with their respective Fair Chance Ordinances. Rose International has an official agreement (ID #132522), effective June 30, 2008, with the U.S. Department of Homeland Security, U.S. Citizenship and Immigration Services, Employment Verification Program (E-Verify). (Posting required by OCGA 13/10-91.)
Salary Range: $130K - $150K
Minimum Qualification
11 - 15 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Information Systems Security Engineer -...
Ann Arbor, MI The MITRE Corporation