Security Architect – Identity & Access Management (IAM)

Novalink SolutionsColumbia, SC
2dRemote

About The Position

The State of South Carolina Department of Admin is looking for - Security Architect - Consultant <\/div> Why is this position open: This is a repost of posting 8662 as the location requirement has changed from hybrid to fully remote. This is a new role supporting identity and access management and security automation. Resources that have previously been submitted to posting ID 8662 will not be considered for this posting. <\/div> THE POSITION WILL WORK AS A SECURITY IDENTITY AND <\/div> ACCESS MANAGEMENT ENGINEER WITHIN THE DIVISION OF INFORMATION <\/div> SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND <\/div> OPERATIONALIZING SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION <\/div> WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS. THIS <\/div> POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE <\/div> AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND <\/div> IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A <\/div> SECURE MANNER. THIS POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS <\/div> WITH THE POSSIBILITY OF EXTENSION. <\/div> POSITION TITLE: SECURITY ARCHITECT - CONSULTANT <\/div> PRE -EMPLOYMENT CHECKS (drug, credit, criminal, motor vehicle)? <\/div> DRUG, DRIVING, CREDIT, CRIMINAL, E -VERIFY, SLED <\/div>

Requirements

  • 5+ YEARS OF EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
  • 5+ YEARS OF EXPERIENCE WITH EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
  • 5+ YEARS OF EXPERIENCE IN CYBER SECURITY AWARENESS AND UNDERSTANDING
  • 5+ YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
  • FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
  • BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD
  • EIGHT YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION

Nice To Haves

  • SIEM ANALYSIS AND REPORTING
  • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS -E
  • APPLICATION SECURITY (APPSEC)
  • CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
  • ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
  • VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.

Responsibilities

  • IDENTITY AND ACCESS MANAGEMENT – ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI -FACTOR AUTHENTICATION, ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
  • RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
  • RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
  • DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
  • ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service