Job Seekers, Please send resumes to resumes@hireitpeople.com
My customer, an international organization located in Washington, DC, has a 6-month contract position available for a Cloud Security Architect.
Please note: This is a true architect role - Extensive work guiding application deployment in a Cloud environment is a non-negotiable.
Position Overview:
The Office of Information Security (OIS) ensures that security efforts throughout the client are coordinated and aligned with the Bank's business and IT strategy. This Office delineates the client's information security plans and ensures, in coordination with the Information Security Council, that resources and all implementation of plans, procedures, and standards are reviewed, supported, and deployed in the most effective and efficient manner and are consistent with overall risk management. The client's Office of Information Security needs a suitable resource to support the Risk functions. The Analyst is expected to assist the team in using a risk based approach to secure Information systems from current and emerging threats during all phases of development and production. He/she will be expected to assist in determining security requirements for IT projects, assist in the development and refresh of the client strategy for information security, assist in the preparation of IT security standards and reference architecture, and be able to perform controls reviews and system assessments to develop risk profiles for IT systems and evaluate the efficiency and effectiveness of the IT control environment.
Essential Job Functions:
- Work with project teams to define security requirements for new systems in line with the enterprise information security architecture
- Provide security design recommendations based on enterprise information security architecture and solution patterns
- Provide guidance and assist in the development of security standards for IT platforms in line with the information security architecture
- Maintain an up-to-date understanding of emerging trends in information security architecture and apply new techniques and trends (in-line with overall information security objectives and risk tolerance of the client) to the client's information security architecture
- Perform controls reviews and system assessments to develop risk profiles for IT systems and evaluate the efficiency and effectiveness of the IT control environment
- Maintain impartiality around IT systems to produce unbiased reports on information security risk
- Provide business units with recommendations to reduce information security risk within their areas
- Identify efficiencies to improve the performance and responsiveness of the ITSSR information security architecture function
- Prepare and present security design and architectural review reports to system owners, business units, and other
- Evaluate client's current software security posture and propose mitigation and remediation plans to meet software security assurance requirements
- Translate technical security deficiencies into business risks that are understandable by business stakeholders in order to get buy-in for security investments
Educational Qualifications and Experience:
- Education: Bachelor's degree in Computer Science, Information Systems, or a related technical field
- Role Specific Experience: 2+ years of experience
- Experience in providing guidance for data protection based on data sensitivity and associated business risk
- Experience with enterprise security architecture design and implementation for a financial services organization or other organizations with similar information security needs and requirements
- Experience guiding project team remediating such vulnerabilities
Certification Requirements:
- Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), and Information Systems Security Management Professional (ISSMP)
Required Skills/Abilities:
- Extensive knowledge of IT, enterprise architecture, software development life cycle, and information security platforms and applications
- Ability to work well under pressure and meet tight deadlines
- High level of motivation, confidence, integrity, and responsibility
- Knowledge of best practices and standards for enterprise security architecture, specifically in the field of Identity & Access Management, Enterprise Content Management, Collaboration Tools, Service-Oriented Architecture, Cloud, Mobility, Data Analytics, and Web 2.0 related services
- Practical knowledge of common Web vulnerabilities as per SANS 25 or OWASP Top 10 specifications
- Excellent interpersonal skills including the ability to work independently and effectively in a team/task force as a team member or leader, and with senior staff and managers in the unit and elsewhere in the client
- Ability to collaborate with senior management stakeholders to identify requirements and drive compliance with approved standards.