Intellectual Capitol
Security Architect/Engineer
Intellectual Capitol, West Columbia, South Carolina, United States, 29172
***Position is 100% onstie in Colubmia, SC***
SCOPE OF THE PROJECT:THE POSITION WILL WORK AS A SECURITY ARCHITECT WITHIN THE AGENCY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER.
Daily Duties / Responsibilities:
Logging and event management - ENSURING THAT APPROPRIATE SECURITY LOGS ARE INGESTED INTO THE SIEM AND/OR LOG AGGRIGATION PLATFORM AND PROPERLY PARSED TO SUPPORT SECURITY OPERATIONSResponsible for planning, designing, development and implementation of enterprise security architecture solutions that align with business goals and risk tolerance. Leveraging state approved processes and technologies wherever possible.Lead process definition, redesign and/or technology innovation of security architecture, to ensure Client solutions support secure delivery of enterprise business architecture and services.Design, deploy and manage countermeasures to known security threats and develop preventative mitigation strategies for new and emergent threats to enterprise data, networks and associated services.Ensure, validate and measure the consistent application of protective measures throughout the enterprise business application and infrastructure support environments. Take appropriate action to protect state data and technology services.Provide innovative technical leadership and expert guidance on the selection, procurement and best-value utilization of security capabilities supportive of:Authentication, authorization and accounting of system accessVulnerability and configuration managementCompute, storage and network infrastructureCloud computingNew and emergent technologiesEstablish, maintain and evolve a best practice methodology for Security Development Lifecycle (SDL) which assures deep integration of secure design and development practices are implemented at all stages of the System or Software Development Lifecycles (SDLCs).Required Skills (rank in order of Importance):
CYBER SECURITY AWARENESS AND UNDERSTANDINGEXPERIENCE WITH UNIX, WINDOWS, LINUX, CISCO/PALO AL TO/FORTINET FIREWALLS, WEB APPS, DATABASED, STRONG AUTHENTICATION, NETWORK SECURITY PROTOCOLS AND PROCEDURESEXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS6 YEARS' OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATIONMINIMUM 5 YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
Preferred Skills (rank in order of Importance):
SIEM and event managementVULNERABILITY ASSESSMENT (VA)NETWORK FIREWALLS, INTRUSION PREVENTION SYSTEMS (IPS), SWITCHING AND ROUTING INFRASTRUCTUREIDENTITY AND ACCESS MANAGEMENT (IAM)PRIVILEGED USER MANAGEMENT (PUM)SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-EAPPLICATION SECURITY (APPSEC)Required Education/Certifications:
BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELDPreferred Education/Certifications:
CEHCCNA
***CANDIDATE MUST BE ABLE TO BE ON-SITE IN COLUMBIA, SC LOCATION WITHIN TWO (2) HOURS OF BEING REQUESTED.***
SCOPE OF THE PROJECT:THE POSITION WILL WORK AS A SECURITY ARCHITECT WITHIN THE AGENCY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER.
Daily Duties / Responsibilities:
Logging and event management - ENSURING THAT APPROPRIATE SECURITY LOGS ARE INGESTED INTO THE SIEM AND/OR LOG AGGRIGATION PLATFORM AND PROPERLY PARSED TO SUPPORT SECURITY OPERATIONSResponsible for planning, designing, development and implementation of enterprise security architecture solutions that align with business goals and risk tolerance. Leveraging state approved processes and technologies wherever possible.Lead process definition, redesign and/or technology innovation of security architecture, to ensure Client solutions support secure delivery of enterprise business architecture and services.Design, deploy and manage countermeasures to known security threats and develop preventative mitigation strategies for new and emergent threats to enterprise data, networks and associated services.Ensure, validate and measure the consistent application of protective measures throughout the enterprise business application and infrastructure support environments. Take appropriate action to protect state data and technology services.Provide innovative technical leadership and expert guidance on the selection, procurement and best-value utilization of security capabilities supportive of:Authentication, authorization and accounting of system accessVulnerability and configuration managementCompute, storage and network infrastructureCloud computingNew and emergent technologiesEstablish, maintain and evolve a best practice methodology for Security Development Lifecycle (SDL) which assures deep integration of secure design and development practices are implemented at all stages of the System or Software Development Lifecycles (SDLCs).Required Skills (rank in order of Importance):
CYBER SECURITY AWARENESS AND UNDERSTANDINGEXPERIENCE WITH UNIX, WINDOWS, LINUX, CISCO/PALO AL TO/FORTINET FIREWALLS, WEB APPS, DATABASED, STRONG AUTHENTICATION, NETWORK SECURITY PROTOCOLS AND PROCEDURESEXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS6 YEARS' OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATIONMINIMUM 5 YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
Preferred Skills (rank in order of Importance):
SIEM and event managementVULNERABILITY ASSESSMENT (VA)NETWORK FIREWALLS, INTRUSION PREVENTION SYSTEMS (IPS), SWITCHING AND ROUTING INFRASTRUCTUREIDENTITY AND ACCESS MANAGEMENT (IAM)PRIVILEGED USER MANAGEMENT (PUM)SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-EAPPLICATION SECURITY (APPSEC)Required Education/Certifications:
BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELDPreferred Education/Certifications:
CEHCCNA
***CANDIDATE MUST BE ABLE TO BE ON-SITE IN COLUMBIA, SC LOCATION WITHIN TWO (2) HOURS OF BEING REQUESTED.***