Logo
C Ents

Security Architect - Intermediate

C Ents, Iowa, Louisiana, United States, 70647


Job Overview:As a Security Architect at our organization, you will be responsible for designing and implementing secure systems and architectures to protect our organization's information assets. The Security Architect plays a critical role in developing and maintaining security policies, standards, and best practices, ensuring that our systems and infrastructure are resilient against cybersecurity threats. This role ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

Job Functional Titles:Personnel performing this work role may also be referred to officially or unofficially as the following functional titles:Information Assurance (IA) ArchitectInformation Security ArchitectSecurity Solutions ArchitectCybersecurity ArchitectRecommended Certifications (Hold one or more certifications):CompTIA Cloud+CompTIA Advanced Security Practitioner (CASP+)ISC2 Certified Cloud Security Professional (CCSP)ISC2 Certified Secure Software Lifecycle Professional (CSSLP)Education:Associate degree or higher from an accredited college or university.

Experience:2-5 years of experience.

Candidates will have understanding and exposure to the following core career elements:Core Tasks:Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.Employ secure configuration management processes.Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.Identify and prioritize critical business functions in collaboration with organizational stakeholders.Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.Core Competencies:Business ContinuityClient Relationship ManagementComputer Network DefenseComputers and ElectronicsData AnalysisEnterprise ArchitectureInformation Technology AssessmentMathematical ReasoningRisk ManagementSystems IntegrationTechnology AwarenessTelecommunicationsCore Knowledge:Knowledge of business continuity and disaster recovery continuity of operations plans.Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinate with system owners, common control providers, and system security officers on the allocation of security controls as system-specific, hybrid, or common controls.Knowledge of the application firewall concepts and functions.Knowledge of electrical engineering as applied to computer architecture.Knowledge of microprocessors.Knowledge of industry-standard and organizationally accepted analysis principles and methods.Knowledge of the enterprise information technology (IT) architectural concepts and patterns.Ability to design architectures and frameworks.Skill in determining how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes.Knowledge of computer algorithms.Knowledge of program protection planning.Knowledge of installation, integration, and optimization of system components.Knowledge of human-computer interaction principles.Knowledge of remote access technology concepts.Knowledge of communication methods, principles, and concepts that support the network infrastructure.

#J-18808-Ljbffr