Information Security Architect

Information Security Architect
EVOTEK, Inc., United States

Experience
1 Year
Salary
0 - 0
Job Type
Job Shift
Job Category
Traveling
No
Career Level
Telecommute
Qualification
As mentioned in job details
Total Vacancies
1 Job
Posted on
Mar 6, 2021
Last Date
Apr 6, 2021
Location(s)

Job Description

EVOTEK is North America's premier enabler of digital business with a focus on innovation. With technology offerings in both data center and cloud, EVOTEK is uniquely equipped to enable customers with the industry shift from traditional IT computing to secure multi-cloud. With services practices in cybersecurity, mobility, platform engineering and artificial intelligence, EVOTEK is moving up the value chain, closer to the part of digital business that matters most. EVOTEK was named to Inc Magazine's Best Places to work in 2018. In 2016, 2017, 2018, and 2019, EVOTEK was named to The San Diego Business Journal's Best Places to work and recognized as #168 on CRN's Solution Provider 500 list, CRN's Next-Generation 250 list, CRN's Triple Crown and highlighted as CRN's Top 150 Growth Companies, holding the #1 spot in 2017, as the fastest growing solution provider in the country.

The Information Security Architect is responsible for the protection of the company’s physical and non-physical Information Technology assets. This includes monitory and security for, but is not limited to: network equipment, servers, desktop and laptop computers, software and electronic information.

Requirements


  • Designing, implementing and maintaining network and computer security systems, open/closed networks, and develop security policies, processes, runbooks to support such systems. A plus would be any experience in a cleared environment and following STIGs.
  • Provide architecture guidance to other IT teams Network Operations, Server Operations, Support, etc.
  • Provide architecture guidance to project teams both within IT and the Business on an as needed basis as part of an SDLC process.
  • Promoting a security philosophy of risk mitigation through proactive security awareness training, cost effective security countermeasures, host-level security, and security planning/integration.
  • Ensuring that all systems are safeguarded against all forms of malicious intrusions.
  • Assisting other groups within the company in developing secure systems.
  • Evaluate network architecture and hardware/software configurations for security vulnerabilities.
  • Participate in the review and analysis of internal projects and external connectivity issues that may have an impact on security
  • Build system baselines to be adhered to for all future build outs.
  • Ensure currency and effectiveness of authentication, encryption, and intrusion detection methods.
  • Establish procedures for controlling physical and remote access to all network facilities and components.
  • Prepare and maintain guidelines for the company’s different resource owners on appropriate security policies and procedures and ensure compliance with these guidelines.
    Coordinate with all concerned parties to ensure the currency of all security patches and updates, as well as anti-virus software.
  • Coordinate and support information security efforts, to include, but not limited to: (a) work with application developers and database administrators to plan and implement application security on intranet and extranet (in the DMZ) servers; (b) provide guidance on risks and vulnerabilities related to common application protocols and web services security; and (c) participate in planning, design, and implementation of digital rights management and information protection schemes.
  • Conduct periodic network penetration tests, using either in-house or outside resources.
  • Be aware of the IT security requirements for the business and implement measures to satisfy those requirements in the most efficient manner.
  • Have a strong understanding of malware analysis and incident response. Be able to perform incident response functions as part of the IR team
  • Conduct Forensic Investigations on an ad-hoc basis

Other Job Functions

  • Provide guidance for the assignment of network rights to the different user accounts and groups.
  • Review security audits and bring awareness to security problems and issues.
  • Coordinate with vendors in the design, implementation, and monitoring of data circuits and other external services to ensure that vulnerabilities are eliminated or minimized.
  • Keep abreast of emerging security technologies and make appropriate recommendations regarding their implementation.
  • Other duties may be assigned

KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:

Ability to maintain sensitive and confidential information as required by government standards

Ability to interact effectively with peers and supervisors

Ability to interact appropriately with the public when necessary

Ability to adhere to workplace rules

EDUCATION AND EXPERIENCE:

  • BA/BS in related field preferred. Equivalent experience/certification acceptable.
  • 8+ year of experience in technical information sy

Job Specification

Job Rewards and Benefits

EVOTEK, Inc.

Information Technology and Services - California, United States
© Copyright 2004-2024 Mustakbil.com All Right Reserved.