800.709.4740
Employee Portal
Security Architect( Contract )
REFERENCE # 17-01935
TITLE # Security Architect

Meet Your Recruiter


Erin Chiz
Senior Technical Recruiter & Resource Manager
Phone: 860-674-1636 ext: 246
Email: echiz@itechsolutions.com
View ALL Jobs for Erin Chiz
View FEATURED Jobs For Erin Chiz
LOCATION Farmington, CT
POSITION TYPE Contract
EXPERIENCE LEVEL

Meet Your Recruiter


Erin Chiz
Senior Technical Recruiter & Resource Manager
Phone: 860-674-1636 ext: 246
Email: echiz@itechsolutions.com
View ALL Jobs for Erin Chiz
View FEATURED Jobs For Erin Chiz
SECURITY ARCHITECT

The information security architect will take a lead role in defining and assessing security policy, strategy, architecture, and practices to support business objectives and risk management strategies.

You will work with other architects to ensure that information security is fully integrated into enterprise technology architecture, and will help IT project teams to plan and architect their solutions consistent with the enterprise security architecture.
The information security architect will advocate for security requirements and objectives while ensuring that security architectures and practices do not impede the needs of the business.

RESPONSIBILITIES
  • Develop and maintain a security architecture that enables client to develop and implement security solutions and capabilities that support business goals and mitigate information security risk.
  • Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures) for reference and use by IT project teams.
  • Track developments and changes in the business and information security environments and update the enterprise security architecture accordingly.
  • As a member of the Architecture Review Board, validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks.
  • Work with Security Operations staff to develop security strategy, plans, and roadmaps to implement the security architecture. Help Security Operations to review and select security technologies, tools and services to implement the roadmaps. Provide high-level requirements and direction for information security projects.
  • Provide input to security policies and standards.
  • Advise application and infrastructure project teams on information security planning, policy, and architecture and provide high-level security requirements to projects. As a member of the Architecture Review Board (ARB), verify that planned projects conform to IT and security architectures and policies. Hand off to Security Engineering staff to provide detailed security technical requirements help IT projects design and implement security solutions in accordance with ARB guidance.
  • Help the risk assessment team to evaluate the design and effectiveness of security controls.
  • Provide oversight and assess the effectiveness of a secure software development program.

QUALIFICATIONS

The successful candidate will demonstrate strong critical thinking and problem solving skills and will be able to act ethically and confidentially, work as part of a team, communicate clearly and concisely both verbally and in writing, adapt to rapidly changing priorities, and work on multiple projects simultaneously.
  • Teamwork and Communication: The security architect must be a consummate team player who readily shares information, facilitates dialogue, and brokers compromises among security, IT, and business stakeholders. He or she must be able to translate security-related matters into business terms that are readily understood by colleagues and must effectively present findings verbally and in writing.
  • Business and Organizational Acumen: The security architect is keenly aware of the dynamics of Webster's business and how IT and information security can support the business. He or she will develop approaches and solutions that serve organizational strategies and goals
  • Conceptual Thinking: The security architect's role is primarily strategic and conceptual, not operational. He or she must recognize abstract patterns and relationships among apparently unrelated entities and situations. He or she will apply appropriate concepts and theories in the development of principles, practices, techniques, tools and solutions.
  • Openness to Learning: The security architect takes personal responsibility for personal growth and changes his or her own ideas. He or she learns from others, inside and outside the organization, tries new approaches, and broadens the scope of work to learn from work assignments.

Security and Technical Experience
The enterprise security architect should have at least seven years of experience in information security, at least 10 years of experience in enterprise information technology, and direct, documented, and verifiable experience with:
  • Using architecture methodologies such as SABSA, Zachman and/or TOGAF
  • Managing security infrastructure -- e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology, and vulnerability management tools
  • Implementing security controls as part of an IT project life cycle
  • Full-stack knowledge of IT infrastructure:
  • Applications
  • Databases
  • Operating systems -- Windows, Unix and Linux
  • Hypervisors
  • IP networks -- WAN and LAN
  • Storage networks -- Fibre Channel, iSCSI and NAS
  • Backup networks and media
  • Public cloud services
  • Identity & Access Management
  • Experience reviewing application code for security vulnerabilities is preferred but not required.

EDUCATION & CERTIFICATIONS
  • Bachelor's or master's degree in computer science, information systems, cybersecurity, or a related field.
  • Industry and Regulatory Experience: PCI-DSS, HIPPA, GLBA, FFIEC, Sarbanes-Oxley
  • The enterprise security architect will evidence his/her knowledge of security and risk management through ongoing continuing professional education. The ideal candidate will maintain one or more of the following certifications:
  • CISSP, CISM, CISA, TOGAF, GAIC


For more information please contact Erin Chiz at 800-709-4740  ext 246

Since 1995, iTech Solutions Inc., has been providing IT Consulting and Direct Hire Services to the Insurance, Financial, Communications, Manufacturing  and Government sectors with local offices in Connecticut, Minnesota, Colorado,  Massachusetts, Tennessee, and New Jersey / Pennsylvania area. 

Our recruiting strategy is simple, if you want to find qualified IT professionals then use IT professionals to find them.   So at iTech Solutions,  our personnel are all career IT professionals with a wide range of IT experience.  We can honestly say our staff understands the technologies, the complexities of finding and selecting the appropriate personnel and the pressures of running successful IT projects.  


Employer will not sponsor applicants for any employment visas, at hiring or in the future, including but not limited to H-1B visas. Corp-to-Corp or subcontract personnel will not be considered for this position.
Back Forward to a friend Apply Here

iTech Solutions is a National Professional Services Firm, specializing in Technical Staffing, Recruiting and Consulting Services for Information Technology, Engineering and Business professionals. iTech Solutions, Inc. does not support and will not post: Any posting that does not comply with applicable laws relating to labor and employment, equal employment opportunity and employment eligibility requirements; and Any posting that requires U.S. citizenship or lawful permanent residence in the U.S. as a condition of employment, unless otherwise required in order to comply with law, regulation, executive order, or federal, state, or local government contract.
iTech Solutions, Inc is an equal opportunity employer.
iTech Solutions is a E-Verify program participant. This employer will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
brands