MUST HAVE: Bachelors or Masters degree in Information Assurance, Computer Science, Information Systems or related field of study. 8+ years of practical experience in the field of IT is required. 5+ years of direct Information Security experience. A security industry certification is required including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+
PREFERRED: Expert level experience in Cloud Authentication and Access management Services. Expert level experience in cloud solution development with Azure, AWS, Google, or other relevant cloud solution architectures. Good understanding of Multi-Factor authentication and Privileged Access Management 2-3 years of software development experience is desirable. Must have working knowledge and understanding of networking technologies such as LAN, WAN, TCP/IP, load balancers, firewalls etc.
What we look for The individual in this role must be able to understand and interpret identity and access management strategies and direction. Further, the person must be able to bring together key tenets of Information Security to the IAM cloud strategies and develop technical security solutions that properly align. The Architect will contribute to the overall effort of the IAM direction of the Firm. Frequent travel is not required for this position. However, it is anticipated that some travel may be required to participate in vendor briefings, project meetings, and/or education opportunities. Generally, travel would be no more than 5 to 6 times a year. Experience/Required Skills: Approximately 4-6 years of experience in information systems architecture methodologiesKnowledge of systems architecture Good interpersonal, communication, consultative, and organizational skills Ability to work and team effectively with clients, management and its staff members
Education: A bachelor's degree in Computer Science or a related discipline, or equivalent work experience Associated topics: attack, forensic, identity, identity access management, information security, information technology security, leak, security, security analyst, security officer
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.