divihn.com
Cybersecurity Architect (Level 4 to Level 6)
divihn.com, Amarillo, Texas, United States, 79161
For further inquiries regarding the following opportunity, please contact one of our Talent Specialists Mohamed | 630-847-1776 Varsha | 630-847-0953 Title: Cybersecurity Architect (Level 4 to Level 6) Duration: 18 months (with possible extension of 1 more year) Location: Amarillo, Texas (Remote) Remote - Traveling to Office location occasionally, and the client will pay expenses for the travel Candidates must have Security Clearance L-Secret required and Q-TS desired Description: Requirement Parameters: Responsible for the overall design and development of secure enterprise security systems that support enterprise mission needs. Document and address information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle. Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment. Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. Determine the security controls for the information system(s) and network(s) and document appropriately. Develop Enterprise Information Technology (IT) requirements that describes baseline and target systems involving cybersecurity and privacy principles. Skilled in managing, testing, and implementing current security architectures for operating systems, networks, cybersecurity analysis tools and related IT systems. Involved in a wide range of cybersecurity areas, including system architectures, firewalls, inspection and analysis tools, encryption components and networking architectures. Involved in security reporting and analysis to regulatory agencies. Identify systemic security issues based on the analysis of vulnerability and configuration data; apply secure system design tools, methods and techniques. Conduct vulnerability scans and recognize vulnerabilities in security systems. Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation