drjobs IT Security Architect

IT Security Architect

Employer Active

drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Richmond - UK

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Job Description

Job Title: IT Security Architect (Hybrid)
Location: Richmond VA
Duration:6 Months
Job Type: CorpCorp / 1099 / Contract W2
Rate: $60/hr on C2C
Client: State of Virginia
Interview Type: In Person
Job Description:
The Virginia Department of Transportations Information Technology Division is seeking a team member to function as a Security Architect. The architect will be accountable to produce a body of work for the Enterprise Architecture Program that analyzes business needs and develop appropriate technology deliverables such as briefs patterns reports data models and hilevel risk assessments to meet them.

The Security Architect will be accountable to produce a body of work for Enterprise Architecture that analyzes business needs and develop technology deliverables such as briefs patterns reports data models and hilevel risk assessments.
Responsibilities:
  • Documents processes and script narratives/executive summaries.
  • Create Business focused documentation for circulation among readers with various technical understanding.
  • Share insight of Security Architecture and IT Governance approaches and implementation methodologies
  • Research and provide written guidance on alignment with security policies/standards.
  • Perform tasks related to Security Compliance and Control Evaluation Risk analysis and exception documentation.
  • Collaborate with Business areas and cross functional Enterprise Architects to fully understand business needs and provide strategic consultation on data securityand riskaverse implementation.
  • Partner with architects other technical team members and to develop roadmaps and strategies to support agency KPIs
  • Design/Implement Enterprise Security/technology Patterns
  • Research and share finding of architecture governance controls and peer review processed with regards to platform technology security and cloud.
Qualifications:
  • Experience in industry or state information security and IT risk management with a focus on security performance and reliability.
  • Significant performing reviews of proposed changes and projects as it pertains to the alignment of applicable state and/or federal security standards/regulations.
  • Significant experience in the development utilizing and presentation of information security architecture policies standards and procedures.
  • Experience with Information Security Frameworks like NIST800 series and Cybersecurity Framework COBIT
  • Experience in monitoring IT environments for compliance with information security architecture policies and standards.
  • Substantial technical experience in 2 or more: Cloudbased technologies Identity & Access Management Vulnerability Management firewalls computer forensic techniques databases collaboration tools web & mail services.
  • Ability to provide input and security direction for future designs information security capabilities and strategic technology alternatives.
  • Excellent written and oral communication and presentation skills (possessing the ability to breakdown complex technical terms into everyday language).
  • Demonstrated ability to work with broad crosssection of personal including all levels of management and external entities such as VITA consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with the Office of Information Security.
  • Work experience in a fastpaced environment and acquire new skills/knowledge to meet customer needs.
  • Thorough understanding of customers priorities and the business criticality of platforms applications and services.
Required / Desired Skills
Required /Desired
Amount of Experience
Knowledge and application of security best practices
Required
Proficient/SME
Experience in Process Modeling
Desired
Entry Level
Knowledge of IT Governance and Compliance
Required
Proficient
Experience in business writing and presenting
Required
Proficient
Educational or Career Experience in Cybersecurity Government technology implementation IT Governance or related field(s).
Required
Proficient/SME

Required/Desired Skills
Skill
Required /Desired
Amount
of Experience
Knowledge and application of security best practices
Required
7
Years
Educational or Career Experience in Cybersecurity Government technology implementation IT Governance or related field(s).
Required
7
Years
Experience in business writing and presenting
Required
5
Years
Knowledge of IT Governance and Compliance
Required
5
Years
Experience in Process Modeling
Desired
2
Years
Recruiter Details:
Recruiter Name: Susheel at gsksolutions dot com
Contact Number: Eight three twoNine nine zeroTwo four two seven
About GSK Solutions Inc:
GSK Solutions Inc is a leading information technology (IT) Services Company that specializes in providing complete consulting solutions and staff augmentation to its clients. We provide ontime onbudget and quality service to our clients and consistently meet their expectations. We are known for our superior execution on a sustained basis.
GSK has been in the business of providing both commercial and custom product development services including Information Security Software Development Consulting and IT Audit. GSK implements highly critical and timesensitive projects for their Fortune 500 clients located across the country.

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.