Security Architect
Remote 100%
6 Months
Direct and lead a Client facing engagement including the development of a cybersecurity plan design and implementation along with the creation of professionallevel deliverables. This individual will have the responsibility to manage and coordinate a variety of engineering staff. As required the Security Consultant will identify key supporting roles for security engineering networking and others needed to deliver an engagement from start to finish successfully.
RESPONSIBILITIES:
- Be the primary lead in cybersecurity delivery engagements for a wide variety of clients in different industry verticals
- Evaluate and recommend security strategies for networks systems operations cloud people process and technologies
- Assess cybersecurity challenges within an environment identify key strategic issues and advise on the best course of action
- Through the application of industry standards and security best practices develop and recommend plans to structure secure architectures
- Understand the security interplay in the areas of application assurance data classification network security and emerging IT trends and threats.
- Analyze and assess client facing security challenges identify recommendations for solutions and define a roadmap to implement such solutions successfully
- Develop create and write and deliver documentation and technical artifacts in a professional matter that will be given to Clients and others in a professional manner QUALIFICATIONS:
Certifications Preferred
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
Work Experience
- Measurable Experience in:
- Consulting for security consulting firms with example deliverables
- Overall cyber security technical experience
- Datacenter administration including design implementation and support
- Networking expertise including handson roles in supporting routers switches and firewalls
- Preferred Experience:
- Zerotrust and enterprise segmentation
- OT environments (design troubleshooting architectural knowledge)
Specialized Knowledge Skills and Abilities
- Knowledge of current and upcoming security technologies and operations
- Working knowledge and consulting experience in the following areas:
- Risk Management and Assessments
- Policy Governance and Compliance
- Threat and Vulnerability Management
- Security Tools Rationalization and Assessment
- Data Protection and Privacy
- Security Operations
- Identity and Access Management
- Zero Trust Architectures
- Network and Systems Security
- Cloud Security
- Operational Technologies and Environments
- Ability to perform concurrent tasks in complex environments under adjusting priorities
- Ability to communicate and modify approach language and style to different audiences
- Professional writing style and experience with demonstrable technical and businessrelated artifacts is required
Measurable Experience in: Consulting for security consulting firms with example deliverables Overall cyber security technical experience Datacenter administration, including design, implementation, and support Networking expertise, including hands-on roles in supporting routers, switches, and firewalls Preferred Experience: Zero-trust and enterprise segmentation OT environments (design, troubleshooting, architectural knowledge) Specialized Knowledge, Skills, and Abilities Knowledge of current and upcoming security technologies and operations Working knowledge and consulting experience in the following areas: Risk Management and Assessments Policy, Governance and Compliance Threat and Vulnerability Management Security Tools Rationalization and Assessment Data Protection and Privacy Security Operations Identity and Access Management Zero Trust Architectures Network and Systems Security Cloud Security Operational Technologies and Environments Ability to perform concurrent tasks in complex environments under adjusting priorities Ability to communicate and modify approach, language, and style to different audiences Professional writing style and experience with demonstrable technical and business-related artifacts is required