Find A Job  ▶
Find Talent  ▶

Apply

IT Security Architect

Richmond, Virginia - Posted on November 23, 2024
Published By Gwendolyn Wood

Trillium Professional is now seeking an IT Security Architect in Richmond!

The client’s Information Technology Division is seeking a team member to function as a Security Architect.  The architect will be accountable to produce a body of work for the Enterprise Architecture Program that analyzes business needs, and develop appropriate technology deliverables, such as, briefs, patterns, reports, data models and hi-level risk assessments to meet them.

The Security Architect will be accountable to produce a body of work for Enterprise Architecture that analyzes business needs, and develop technology deliverables, such as, briefs, patterns, reports, data models and hi-level risk assessments.

Responsibilities:
·        Documents processes and script narratives/executive summaries.
·        Create Business focused documentation for circulation among readers with various technical understanding.
·        Share insight of Security Architecture and IT Governance approaches and implementation methodologies
·        Research and provide written guidance on alignment with security policies/standards.
·        Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and exception documentation.
·        Collaborate with Business areas and cross- functional Enterprise Architects to fully understand business needs and provide strategic consultation on data security and risk-averse implementation.
·        Partner with architects, other technical team members and to develop roadmaps and strategies to support agency KPIs
·        Design/Implement Enterprise Security/technology Patterns
·        Research and share finding of architecture governance, controls, and peer review processed with regards to platform technology, security, and cloud.

Pay rate is $54 per hour. Apply now!

Qualifications:       
·        Experience in industry or state information security and IT risk management with a focus on security, performance, and reliability.
·        Significant performing reviews of proposed changes and projects as it pertains to the alignment of applicable state and/or federal security standards/regulations.
·        Significant experience in the development, utilizing, and presentation of information security architecture policies, standards and procedures.
·        Experience with Information Security Frameworks like NIST-800 series and Cybersecurity Framework, COBIT
·        Experience in monitoring IT environments for compliance with information security architecture policies and standards.
·        Substantial technical experience in 2 or more: Cloud-based technologies, Identity & Access Management, Vulnerability Management, firewalls, computer forensic techniques, databases, collaboration tools, web & mail services.
·        Ability to provide input and security direction for future designs, information security capabilities, and strategic technology alternatives.
·        Excellent written and oral communication and presentation skills (possessing the ability to breakdown complex technical terms into everyday language).
·        Demonstrated ability to work with broad cross-section of personal including all levels of management and external entities such as consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with our Office of Information Security.
·        Work experience in a fast-paced environment and acquire new skills/knowledge to meet customer needs.
·        Thorough understanding of customers priorities and the business criticality of platforms, applications and services.
·        Knowledge and application of security best practices Required 7 Years
·        Educational or Career Experience in Cybersecurity, Government technology implementation, IT Governance or related field(s). Required 7 Years
·        Experience in business writing and presenting Required 5 Years
·        Knowledge of IT Governance and Compliance Required 5 Years
·        Experience in Process Modeling Desired 2 Years


Trillium has been recruiting and placing clerical and office professionals for over 30 years. From Fortune 100 companies to small businesses, our philosophy remains the same: to achieve excellence by providing quality employees with an uncompromising level of service. We believe in honesty, integrity, and a simple philosophy of providing value to our customers and our employees. We strive to be unsurpassed in the recruitment and placement of professionals. Trillium is an Equal Opportunity Employer.

By applying to this job, I agree to receive electronic communications including SMS text and email regarding future opportunities, referral bonus incentives, and other promotions from Trillium. You may opt out at any time from future communications by responding STOP to any electronic communication. You may view our full privacy policy at https://trilliumstaffing.com/jobs/privacy/.

Trillium offers a comprehensive benefit package that includes the ability to participate in health insurance and retirement plans, paid holidays, state required leave, and vacation days, if applicable. Trillium’s offerings are dependent on the state in which the assignment is located, length of time worked, and may change depending on assignment. Benefit packages for direct hire placements vary based on the client company.

Want to apply for IT Security Architect?

  • To apply for IT Security Architect enter your email address below.

  • If you have an account with indeed.com, you can also

       

      Contact Us if you have any questions


      Contact

      Our intentions are to fill job vacancies as quickly as possible with qualified candidates. We are always accepting applications if a time sensitive job has an application deadline it is noted in the job description. Click on "Apply" to begin the apply process.

      Logo
      Your office staff is always ready and willing to help us in our time of need. We have incorporated many of their suggestions into our operational policies.
      Jim