Description
SCOPE OF THE PROJECT:
THE POSITION WILL WORK AS A SECURITY ARCHITECT WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES.
THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER.
THIS POSITION IS EXPECTED TO BE NEEDED FOR 6-12 MONTHS WITH THE POSSIBILITY OF EXTENSION.DAILY DUTIES / RESPONSIBILITIES:
CANDIDATE MUST BE ABLE TO BE ON-SITE IN COLUMBIA, SC LOCATION WITHIN TWO (2) HOURS OF BEING REQUESTED.
- CANDIDATE MUST BE ABLE TO WORK TWO (2) DAYS ON-SITE IN COLUMBIA, SC LOCATION EACH WEEK.
- RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY ARCHITECTURE SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE. LEVERAGING STATE APPROVED PROCESSES AND TECHNOLOGIES WHEREVER POSSIBLE.
- LEAD PROCESS DEFINITION, REDESIGN AND/OR TECHNOLOGY INNOVATION OF SECURITY ARCHITECTURE, TO ENSURE DIS SOLUTIONS SUPPORT SECURE DELIVERY OF ENTERPRISE BUSINESS ARCHITECTURE AND SERVICES.
- DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
- ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
- AUTHENTICATION, AUTHORIZATION AND ACCOUNTING OF SYSTEM ACCESS
- LOGGING AND EVENT MANAGEMENT
- VULNERABILITY AND CONFIGURATION MANAGEMENT
- COMPUTE, STORAGE AND NETWORK INFRASTRUCTURE
- CLOUD COMPUTING
- NEW AND EMERGENT TECHNOLOGIES
- ESTABLISH, MAINTAIN AND EVOLVE A BEST PRACTICE METHODOLOGY FOR SECURITY DEVELOPMENT LIFECYCLE (SDL) WHICH ASSURES DEEP INTEGRATION OF SECURE DESIGN AND DEVELOPMENT PRACTICES ARE IMPLEMENTED AT ALL STAGES OF THE SYSTEM OR SOFTWARE DEVELOPMENT LIFECYCLES (SDLCS).
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
- EXPERT UNDERSTANDING OF SYSTEM DESIGN AND THE ENGINEERING PROCESS
- CYBER SECURITY AWARENESS AND UNDERSTANDING
- EXPERT UNDERSTANDING OF INFORMATION COMPUTER AND NETWORK SECURITY. ITS OPERATION, ENGINEERING, AND ARCHITECTURE
- EXPERIENCE WITH UNIX, WINDOWS, LINUX, CISCO/PALO AL TO/FORTINET FIREWALLS, WEB APPS, DATABASED, STRONG AUTHENTICATION, NETWORK SECURITY PROTOCOLS AND PROCEDURES
- EXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
- ONAPSIS VULNERABILITY MANAGEMENT PLATFORM
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
- NETWORK FIREWALLS, INTRUSION PREVENTION SYSTEMS (JPS), SWITCHING AND ROUTING INFRASTRUCTURE
- IDENTITY AND ACCESS MANAGEMENT (1AM)
- PRIVILEGED USER MANAGEMENT (PUM)
- SECURITY INFORMATION EVENT MANAGEMENT (SIEM) SYSTEMS
- SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
- VULNERABILITY ASSESSMENT (VA)
- APPLICATION SECURITY (APPSEC)
- SAP EXPERIENCE
REQUIRED EDUCATION/CERTIFICATIONS:
- BACHELORS DEGREE IN AN
INFORMATION TECHNOLOGY OR
INFORMATION SECURITY RELATED
FIELD
- 6 YEARS OF RELEVANT WORK
EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
- MINIMUM 5 YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
PREFERRED EDUCATION/CERTIFICATIONS:
- CEH
- CCNA
Requirements
Network Securityrisk/vulnerability assessments
Yes
1
Lead
Currently Using
6 + Years
Networking & Directories
Network security
Yes
1
Lead
Currently Using
6 + Years
Networking & Directories
privileged user management (PUM)
No
1
Expert
Within 6 Months
- 6 Years
Cisco
Yes
1
Lead
Currently Using
6 + Years
Additional Skills:
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
- EXPERT UNDERSTANDING OF SYSTEM DESIGN AND THE ENGINEERING PROCESS
- CYBER SECURITY AWARENESS AND UNDERSTANDING
- EXPERT UNDERSTANDING OF INFORMATION COMPUTER AND NETWORK SECURITY. ITS OPERATION, ENGINEERING, AND ARCHITECTURE
- EXPERIENCE WITH UNIX, WINDOWS, LINUX, CISCO/PALO AL TO/FORTINET FIREWALLS, WEB APPS, DATABASED, STRONG AUTHENTICATION, NETWORK SECURITY PROTOCOLS AND PROCEDURES
- EXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
- ONAPSIS VULNERABILITY MANAGEMENT PLATFORM
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
- NETWORK FIREWALLS, INTRUSION PREVENTION SYSTEMS (JPS), SWITCHING AND ROUTING INFRASTRUCTURE
- IDENTITY AND ACCESS MANAGEMENT (1AM)
- PRIVILEGED USER MANAGEMENT (PUM)
- SECURITY INFORMATION EVENT MANAGEMENT (SIEM) SYSTEMS
- SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
- VULNERABILITY ASSESSMENT (VA)
- APPLICATION SECURITY (APPSEC)
- SAP EXPERIENCE