Litehouse Inc.
Cyber Security Architect (Remote)
Litehouse Inc., Sandpoint, Idaho, United States, 83888
Litehouse is seeking an experienced and strategic Cyber Security Architect to join our team. This is a remote opportunity. Candidates must live in the US.
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in action plan designs. Reviews current architectures and systems to ensure consistency and compliance with the organization's guidelines, policies, and standards. Keeps abreast of the latest cyber threat information.
What you will do:Conduct routine analysis and security control monitoring and management of organization's computing environment (including network, servers, storage, end user computers/devices, and other technology systems) to identify existing vulnerabilities and ensure that existing security practices are working as designed; monitors network traffic activity; monitors various Infrastructure systems (firewalls, intrusion detection systems, wireless networks, virtual private networks, network account access). Run vulnerability scans and perform mitigation and remediation actions.Continually conduct full scale evaluations and audit our systems, networks, devices, and applications to ensure we are following security policies and best practices. Work cross-functionally with team-members and third parties to assess vendor risk.Implement and update security policies, standards, and procedures to ensure operational security across all platforms and services.Monitor system logs, SIEM tools, and network traffic for unusual or suspicious activity. Interpret such activity and make recommendations for mitigation. Advises security manager of exception-based security events.Work closely with system and network owners to harden devices, systems, applications, and accounts. Assist in securing and monitoring firewalls, intrusion detection systems, switches, and routers. Support, monitor, and manage security tools across the organization (SIEM, PAM/IAM, password vault, VPN, etc).Assist in employee cyber-security awareness training for the organization.Work with cybersecurity partners to conduct risk assessments and vulnerability assessments to identify and mitigate security threats.Respond in real time to security related incidents and remediation of security incidents; provides collection of information and intelligence related to incidents; secures systems for forensic examination by third parties; may be required to complete forensic examination of systems. Resolve or escalate reported security incidents; Investigate and resolve security violations by providing postmortem analysis to illuminate the issues and possible solutions.Qualifications:Bachelor's Degree Computer Science, cybersecurity, or a related field Required or equivalent of education and experience required.4-6 years Experience in cybersecurity, networking, system administration, endpoint support and managing security infrastructure required.CompTIA Advanced Security Practitioner & CompTIA Security+ Certification (CASP) required upon hire.CISSP Certified Information Systems Security Professional SSCP, or other equivalent certifications required within 1 year.Knowledge/Skills/Abilities:Strong analytical skills to analyze security requirements and relate them to appropriate security controls (High proficiency).Must have strong verbal and written communications skills with ability to express ideas effectively and efficiently in the common language (High proficiency).Ability to establish & maintain effective working relationships with all contacts inside and outside of the company with strong interpersonal and organizational skills. Ability to deal effectively with a wide range of internal and external customers. (High proficiency).Knowledge of network, system, and application security. Knowledge of firewalls and endpoint security. (High proficiency).Knowledge and understanding of security risk management, IT security, and infrastructure. (High proficiency).Ability to juggle multiple projects while meeting deadlines are vital. Good time management and prioritization capabilities. (High proficiency).Proven ability to make critical decisions under pressure and guide teams through complex incident response scenarios. (High proficiency).Our people are passionate about what they do, the product they sell, and the customers they serve. If you're looking for an opportunity to be a part of a work family that values collaboration, innovation and dedication, we're the right company for you.
We do not offer sponsorship.
All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
#J-18808-Ljbffr
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in action plan designs. Reviews current architectures and systems to ensure consistency and compliance with the organization's guidelines, policies, and standards. Keeps abreast of the latest cyber threat information.
What you will do:Conduct routine analysis and security control monitoring and management of organization's computing environment (including network, servers, storage, end user computers/devices, and other technology systems) to identify existing vulnerabilities and ensure that existing security practices are working as designed; monitors network traffic activity; monitors various Infrastructure systems (firewalls, intrusion detection systems, wireless networks, virtual private networks, network account access). Run vulnerability scans and perform mitigation and remediation actions.Continually conduct full scale evaluations and audit our systems, networks, devices, and applications to ensure we are following security policies and best practices. Work cross-functionally with team-members and third parties to assess vendor risk.Implement and update security policies, standards, and procedures to ensure operational security across all platforms and services.Monitor system logs, SIEM tools, and network traffic for unusual or suspicious activity. Interpret such activity and make recommendations for mitigation. Advises security manager of exception-based security events.Work closely with system and network owners to harden devices, systems, applications, and accounts. Assist in securing and monitoring firewalls, intrusion detection systems, switches, and routers. Support, monitor, and manage security tools across the organization (SIEM, PAM/IAM, password vault, VPN, etc).Assist in employee cyber-security awareness training for the organization.Work with cybersecurity partners to conduct risk assessments and vulnerability assessments to identify and mitigate security threats.Respond in real time to security related incidents and remediation of security incidents; provides collection of information and intelligence related to incidents; secures systems for forensic examination by third parties; may be required to complete forensic examination of systems. Resolve or escalate reported security incidents; Investigate and resolve security violations by providing postmortem analysis to illuminate the issues and possible solutions.Qualifications:Bachelor's Degree Computer Science, cybersecurity, or a related field Required or equivalent of education and experience required.4-6 years Experience in cybersecurity, networking, system administration, endpoint support and managing security infrastructure required.CompTIA Advanced Security Practitioner & CompTIA Security+ Certification (CASP) required upon hire.CISSP Certified Information Systems Security Professional SSCP, or other equivalent certifications required within 1 year.Knowledge/Skills/Abilities:Strong analytical skills to analyze security requirements and relate them to appropriate security controls (High proficiency).Must have strong verbal and written communications skills with ability to express ideas effectively and efficiently in the common language (High proficiency).Ability to establish & maintain effective working relationships with all contacts inside and outside of the company with strong interpersonal and organizational skills. Ability to deal effectively with a wide range of internal and external customers. (High proficiency).Knowledge of network, system, and application security. Knowledge of firewalls and endpoint security. (High proficiency).Knowledge and understanding of security risk management, IT security, and infrastructure. (High proficiency).Ability to juggle multiple projects while meeting deadlines are vital. Good time management and prioritization capabilities. (High proficiency).Proven ability to make critical decisions under pressure and guide teams through complex incident response scenarios. (High proficiency).Our people are passionate about what they do, the product they sell, and the customers they serve. If you're looking for an opportunity to be a part of a work family that values collaboration, innovation and dedication, we're the right company for you.
We do not offer sponsorship.
All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
#J-18808-Ljbffr