About The Position

Provides senior level architect support for information security activities.  Responsible for identifying and evaluating information technology (IT) security risks, and architecting solutions to manage those risks.  Collaborates with project managers, solutions architects, and business systems architects to provide education and solutioning related to potential project/implementation security risks.

Requirements

  • At least 5 years computer and security architecture experience, or equivalent combination of relevant education and experience.
  • Knowledge of plan of action and milestones for network, information system, and data security architectures.
  • Ability to obtain final approval of baseline configurations for all company information systems.
  • Ability to secure final approval of security controls and certification and accreditation of systems and applications ready to transition into the production environment.
  • Knowledge of installation and use of all network monitoring tools.
  • Ability to research and perform log analysis reviews to support security architectural studies and evaluations.
  • Knowledge of firewall management, secure routing configurations, encryption, Virtual Local Area Networks (VLAN) deployment, Intrusion Prevention System (IPS)/Intrusion Detection System (IDS) integration, Virtual Private Network (VPN), and Microsoft Windows security.
  • Knowledge of HIPAA,  ISO 27001, and Payment Card Industry Data Security Standard(PCI-DSS).
  • Ability to work cross-collaboratively across a highly matrixed organization with internal and external stakeholders.
  • Excellent verbal and written communication skills.
  • Microsoft Office suite/applicable software program(s) proficiency.

Nice To Haves

  • Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM).
  • Certified Information Systems Security Architecture Professional (CISSP-ISSAP), Information Systems Security Engineering Professional) (CISSP-ISSEP), or Certified Cloud Security Professional (CCSP).
  • Experience as a security engineer within a Cisco/Microsoft environment.
  • Management/leadership experience.

Responsibilities

  • Provides lead support to information security architecture team responsible for developing and maintaining effective and efficient security solutions within a heterogeneous technology environment.
  • Maintains enterprise-wide security architecture and recommends specific controls to support financial services operations, application development, data center operations, and Cloud solutions.
  • Evaluates and recommends physical and virtual security solutions to bolster mobile, desktop, server, database, and network implementations.
  • Proposes and reviews existing design solutions to limit access to assets and associated facilities to authorized users, processes, or devices, and to authorized activities and transactions.
  • Determines requirements for identities and credentials for authorized devices and users through single and multi-factor authentication.
  • Validates controls used to manage and protect physical access to assets.
  • Ensures remote access is managed with appropriate security designs and controls.
  • Incorporates principles of least privilege and separation of duties into access permissions and security designs.
  • Assures network integrity by incorporating and maintaining network segmentation into security designs.
  • Supervises the design and implementation of data security solutions to ensure company-owned and controlled data are managed consistent with the organization’s risk strategy.
  • Oversees the use of encryption technology to protect data-at-rest and data-in-transit, and implements data loss prevention technology and procedures to prevent data leaks.
  • Ensures adequate protection and maintenance of encryption keys.
  • Maintains system assurance and availability by ensuring adequate capacity is maintained in security designs.
  • Recommends integrity checking mechanisms to verify software, firmware, and information integrity.
  • Verifies security controls and standards exist to create and maintain a production environment that is separate from the development and testing environment.
  • Develops procedures to formally manage assets at the end-of-life through removal, transfer, and disposition.
  • Maintains and uses security policies, processes, and procedures to manage the protection of information systems and assets.
  • Oversees the creation and maintenance of baseline configurations, change control standards, and the application of a continuous improvement processes within a system development lifecycle (SDLC).
  • Develops processes and procedures to maintain and test back-ups periodically and ensure data is destroyed according to policy.
  • Evaluates and shares the effectiveness of engineering solutions and technologies with appropriate parties.
  • Ensures human resources (HR) practices account for cyber security requirements through the employment or contract lifecycle.
  • Supervises design and implementation of technical security solutions to ensure the security and resilience of systems and assets is consistent with related policies, procedures, and agreements.
  • Applies the principle of least privilege to control access to systems and assets.
  • Protects communication networks using industry standards and best practices.
  • Certifies maintenance and repairs of information system components are performed consistent with policies and procedures.
  • Integrates approved and controlled tools into security designs to ensure maintenance and repair of assets are performed and logged in a timely manner.
  • Prevents unauthorized remote maintenance with controls that require approval, logging, and secure connections.

Benefits

  • Molina Healthcare offers a competitive benefits and compensation package.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service