Security Architect – Identity & Access Management (IAM)

Novalink Solutions LLCMason Township, OH
2dRemote

About The Position

The State of South Carolina Department of Admin is looking for - Security Architect - Consultant Why is this position open: This is a repost of posting 8662 as the location requirement has changed from hybrid to fully remote. This is a new role supporting identity and access management and security automation. Resources that have previously been submitted to posting ID 8662 will not be considered for this posting. THE POSITION WILL WORK AS A SECURITY IDENTITY AND ACCESS MANAGEMENT ENGINEER WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER. THIS POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION.

Requirements

  • 5+ YEARS OF EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
  • 5+ YEARS OF EXPERIENCE WITH EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
  • 5+ YEARS OF EXPERIENCE IN CYBER SECURITY AWARENESS AND UNDERSTANDING
  • 5+ YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
  • FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
  • BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD
  • EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION

Nice To Haves

  • SIEM ANALYSIS AND REPORTING
  • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
  • APPLICATION SECURITY (APPSEC)
  • CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
  • ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
  • VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.

Responsibilities

  • IDENTITY AND ACCESS MANAGEMENT – ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI-FACTOR AUTHENTICATION, ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
  • RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
  • RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
  • DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
  • ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service