Security Architect / Engineer - Zero Trust Architecture

WaveStrong, Inc.Sacramento, CA
102d

About The Position

This is an exciting contract opportunity for a Security Architect / Engineer specializing in Zero Trust Architecture (ZTA). The role requires over 5 years of experience in security architecture and engineering, with a strong focus on evaluating and implementing ZTA. The successful candidate will be responsible for developing an implementation roadmap for ZTA, which includes planning, scheduling, and creating presentation decks. Additionally, the role involves conducting cybersecurity program and architecture risk reviews, as well as providing support for ZTA implementation activities.

Requirements

  • 5+ years of experience as a Security Architect / Engineer.
  • Expertise in evaluating Zero Trust Architecture (ZTA).
  • Experience with cybersecurity program and architecture risk reviews.
  • Proficiency in evaluating and implementing security products.
  • Experience with system, device, and application-level hardening.
  • Ability to assess cybersecurity posture of various technologies.
  • Experience in supporting integrated cyber defense operations.
  • Strong research skills in emerging technologies and threats.

Nice To Haves

  • ISC2 Certified Information Systems Security Professional (CISSP).
  • ISC2 Certified – Governance Risk and Compliance (CGRC).
  • Certified Authorization Professional (CAP).
  • ISACA Certified Information Security Manager (CISM).
  • ISACA Certified in Risk and Information Systems Control (CRISC).
  • CompTIA Certified Advanced Security Practitioner (CASAP+).
  • CompTIA Security+.

Responsibilities

  • Evaluate and implement Zero Trust Architecture (ZTA) solutions.
  • Develop ZTA implementation roadmap including plans, schedules, and presentation decks.
  • Conduct cybersecurity program and architecture risk reviews.
  • Provide architect and engineer support for ZTA implementation activities.
  • Evaluate, recommend, and implement commercial hardware and software security products.
  • Perform system, device, and application-level hardening.
  • Assess the cybersecurity posture of software, hardware, and firmware.
  • Support integrated, dynamic cyber defense operations.
  • Leverage cybersecurity solutions to deliver operational services.
  • Research emerging technologies and security requirements to address organizational goals.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service