What are the responsibilities and job description for the Cyber Security Solutions Architect, Local position at Voto Consulting LLC?
Position- Cyber Security Solutions Architect, Local
Location- Lutz, FL.
Visa- USC, GC
Type- Fulltime///Hybrid
Job Requirement-
QUALIFICATIONS (SUMMARY)
- Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, Engineering, or equivalent experience
- 8 years of cybersecurity or IT experience with strong enterprise architecture exposure
- Demonstrated expertise across IAM/IGA, PAM, DLP, Application Security, and PKI
- Strong communication, documentation, and strategic planning skills
Licenses/Certifications
Required:
- From the list of certification vendors, 3 related Information Security professional certification or ability to obtain via self-study within one year of hire date (ex: (ISC)2, GIAC, ISACA, CompTIA, e-Council, etc.).
- ITIL v3 and three or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CEH, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).
Related Experience
Required: 8 years of related Cyber Security or IT experience (Information Systems Audit or Assessor role, Information Security role, systems management, systems administration, information systems security, system certification, risk analysis) with a focus on DLP and/or FIM solutions and security controls.
Possess an expert level of knowledge in the discipline of cybersecurity as well as a high level of competency in architecture, methodologies, and best practices for IAM, Data Protection, and Application and Infrastructure Security concepts, strategies, standards, functions, capabilities, and technologies.
- A solid understanding of fundamental principles of cybersecurity, including threat landscape, vulnerabilities, and risk management.
- Significant high-level system/security engineering experience with broad knowledge across many technologies.
- Knowledge of systems security engineering (SSE) principles and practices.
- Knowledge of secure software deployment principles and practices.
- Knowledge of data classification tools and techniques.
- Knowledge of enterprise architecture (EA) reference models, frameworks, principles, and practices.
- Knowledge of the Open Systems Interconnect (OSI) reference model.
- Knowledge of configuration management tools and techniques.
- Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices.
- Familiarity with relevant security standards and frameworks such as NIST Special Publication 800-53, ISO 27001, and others depending on the industry.
- Knowledge of applicable laws and regulations governing information security, privacy, and data protection.
- Understanding of information technology systems, network architecture, and common technologies to assess security controls effectively.
- Knowledge of security control frameworks and their implementation, including access controls, encryption, and incident response.
- Knowledge of advanced cybersecurity tools and platforms, such as SIEM, IDS/IPS, endpoint protection, and threat intelligence solutions, for effective risk analysis and mitigation.
- Ability to conduct comprehensive risk assessments, identifying and analyzing security risks to information systems.
- Technical skills to assess security controls, perform vulnerability assessments, and understand the technical aspects of security implementations.
- Strong communication skills to effectively convey assessment findings, risks, and recommendations to technical and non-technical stakeholders.
- Ability to create clear and detailed documentation, including assessment plans, reports, and recommendations.
- Critical thinking and problem-solving skills to analyze complex security issues and recommend appropriate solutions.
- Keen eye for detail to identify vulnerabilities, weaknesses, and discrepancies in security controls and documentation.
- Ability to adapt to evolving cybersecurity threats, technologies, and regulatory requirements.
- Ability to analyze complex datasets and identify trends and patterns that could indicate cybersecurity risks or vulnerabilities.
- Adherence to ethical standards and professionalism, as SCAs often have access to sensitive information and play a critical role in maintaining the integrity of security assessments.
- Collaboration with various stakeholders, including system owners, security teams, and management, to ensure a comprehensive understanding of the information system and its security controls.
- Commitment to continuous learning and staying updated on the latest.
Thanks & Regards
Shivam Rajpal
Team Lead- US IT Recruitment
Desk- 201-331-6992 X 142
Email- Shivam@votoconsulting.com
LinkedIn- https://www.linkedin.com/in/shivam-rajpal-b7a58912a/
Voto Consulting LLC- M/WBE Certified Company
www.votoconsulting.com