Cyber Security Architect with Infrastructure Background

Confidential Company  •  Jessup, PA

8 - 10 years experience  •  Security

Salary depends on experience
Posted on 11/24/17 by Choudhary Prabhakar
Jessup, PA
8 - 10 years experience
Security
Salary depends on experience
Posted on 11/24/17 by Choudhary Prabhakar

Position: Cyber Security Architect with Infrastructure Background,

 

Location: Jessup, PA,

 

Duration: Contract/Contract to Hire/Full Time,

 

Job Description:-

 

•              7-10 years of progressive information securityexperience across various information security / information technologyrisk management domains such as but not limited to: application security, infrastructuresecurity, identity and access management, vulnerability and cyberthreat management, securityarchitecture, etc.

•              Minimum 5years designing security for enterprise infrastructure, network and application architectures.

•              3-5years of previous client facing and advisory experiencerequired. Big4 IT risk management consulting experience a plus.

•              3-5years of experience in an information security or risk advisory role for regulated environments.

•              In depth knowledge of HIPAA regulatory requirements, PCI control standards, and HITRUST/NIST CSF. 

•              Knowledge of Government Healthcare (Medicaid/Medicare) is a plus.

•              Demonstrated experience in the evaluation, selection and decision making as it relates to security controls

•              Previous knowledge and expertise in designing and architecting information technology and security controls across complex and diverse networks, applications and infrastructures

•              Technical aptitude and critical thinking skills while having the ability to think outside the box, demonstrated ability to solve complex information security problems, ability to observe securityrisks and weaknesses and provide security recommendations to respective project and delivery teams

•              Ability to translate technical risk issues and distill such issues to common IT business leaders and upper management

•              Ability to build complex information security designs geared at demonstrating DiD approaches, as well as demonstrate the principals of CIA in a given design

•              Ability to design and incorporate security designs in new, legacy, and in environments undergoing general IT transitions / upgrades

•              Understanding of the current information security and IT risk management solutions market and vendor spaces across broad security domains

•              Subject matter expert (SME) across the entire IT stack as well as diverse IT systems, networking and security components, applications, and operating systems. Solid understanding as to how to mitigate risks with common controls such as WAF’S, IDPS’s, MPS’s, SIEM, AWL, etc.

•              Demonstrated securityexperience across cloud architecture deployments, micro-applications, and general application security.

•              Experienceworking within and/or leading a security operations center is required

•              Working knowledge of application security controls, common threats, and the cost-effective implementation of mitigating controls and practices

•              Ability to think strategically, strong attention to detail and organization skills

•              Understanding of information risk management frameworks, regulations, data protection guidelines and standards

•              Lead the improvement of governance, compliance, and quality assurance across securityarchitectures supporting internal client delivery teams.

•              Technical aptitude and critical thinking skills while having the ability to think outside the box, demonstrated ability to solve complex information security problems, ability to observe securityrisks and weaknesses and provide security recommendations to respective project and delivery teams

•              Experience authoring reports, data flow diagrams, and Visio drawings for security systems and networks required.

•              Experiencewith working on global teams across time zones, cultures and languages.

•              Bachelor’s Degree in Computer Science, Engineering or related field required, Graduate degrees in related fields highly desired

CISSP, CISM, or other relevant information security industry recognized certification required.

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.