Other Jobs To Apply
No other job posts for this day.
<meta><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;"> </strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Job Title: IAM SECURITY ARCHITECT</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Location: Remote</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Position Type: C2C/W2</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Years of Experience:10+ years</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Duration of the Contract: 12 months</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;"> </span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Project Scope:</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">We are seeking a Security Architect to support </span><b><strong style="white-space:pre-wrap;">security automation</strong></b><span style="white-space:pre-wrap;"> and </span><b><strong style="white-space:pre-wrap;">Identity & Access Management (IAM)</strong></b><span style="white-space:pre-wrap;"> initiatives. This role focuses on implementing, integrating, and operationalizing security technologies while developing automation and integration among enterprise security tools.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">The Security Architect will work closely with IT and security teams to design, deploy, and maintain secure systems aligned with business goals and risk tolerance. This position plays a critical role in enhancing enterprise security posture, mitigating threats, and ensuring compliance with applicable security frameworks.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;"> </strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Key Responsibilities:</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Design, deploy, and manage enterprise security solutions that align with organizational goals.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Implement Identity & Access Management (IAM) solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Active Directory, and application integrations.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Develop automation for disparate security and IT tools using Python, Bash, and other technologies.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Plan and execute mitigation strategies for known and emerging security threats to enterprise data and networks.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Ensure consistent application of security measures across business applications and infrastructure.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Conduct security monitoring, SIEM analysis, and reporting.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Support large IT environments and system deployments, ensuring adherence to security frameworks (e.g., NIST CSF, CJIS, IRS 1075, CMS MARS-E).</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;"> </span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Required Skills & Experience:</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">5+ years of automation development experience using Python and Bash.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">5+ years of experience with IAM, identity and access controls, logging, and reporting systems.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">5+ years of cyber security awareness and applied knowledge.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">5+ years working with Linux, Windows, and network security protocols.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Experience supporting large IT environments or system deployments.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Strong SIEM analysis and reporting skills.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Understanding of application security (AppSec) principles.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;"> </strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><b><strong style="white-space:pre-wrap;">Preferred Skills:</strong></b></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Knowledge of SIEM analysis and reporting</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Knowledge of Security Frameworks including: NIST, CSF, CJIS, IRS 1075, CMS MARS-E</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Knowledge of application security (APPSEC).</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">CISSP, CISA, CISO or equivalent advanced security certification. Additional relevant certifications include E.G., CEH, OSCP, GPEN).</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;">·</span><span style="font-size:7pt;white-space:pre-wrap;"> </span><span style="white-space:pre-wrap;">Vendor Certifications in SIEM or logging technologies.</span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;"> </span></p><p style="font-family:" basel="" grotesk",arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px="" 0px;padding:0px;"=""><span style="white-space:pre-wrap;"> </span></p>