It’s raining opportunity in Portland
The tech industry in Portland market is characterized by many small, highly nimble firms at the leading edge of innovation—and a booming job market. Come grow with us in Portland: check out our Portland IT jobs.
We are in need of an Information Security Architect!
The Security Architect provides expert advice to business executives and IT about how to best solve tough business and technical security problems, in a dynamic and complex technology environment. Architects lead the investigation of new technologies (applications, systems, software, hardware, etc.) which are being contemplated to solve a problem, or when it is unclear which existing technologies to use or how to tie them together.
In this role, you will:
Participate as a key member of agile teams to consult with the business, to understand the business needs and impacts. Recommend effective solutions.
Engage in business analysis, information acquisition analysis and design, data access analysis and design, archive and recovery strategy, security, and change management.
Champion the installation and implementation of new technologies through their initiation phase providing a strategy for implementation and working to ensure a successful maintenance hand-off.
Mentor other Architects in the definition of security technology implementation strategies and provide assistance where needed in transitioning the technology to the delivery organization.
Research/assess available technologies in relation to the enterprise’ s current and future needs.
Bachelor’s degree in Computer Science, Information Systems, or related discipline. Advanced degree is preferred.
CISSP is required. Other SANS GIAC certifications are desirable.
Seven years in IT:
A minimum of two (2) years of technical leadership and architecture experience.
A minimum of three (3) years of experience evaluating business requirements and designing complete systems solutions in complex environments.
A minimum of three (3) years of experience in purely security roles, demonstrating a breadth of technical and administrative security expertise
Experience in the healthcare or insurance industry is preferred.
Strong understanding of the following technologies is preferred: antivirus/antimalware, IDS/IPS (HIDS, NIDS), data loss prevention, vulnerability assessment tools, penetration testing tools, centralized logging and log analysis tools, firewalls, computer and network forensics, consumer/mobile device security controls, network proxies, identity management, federated identity management, web application security, cloud technologies and cloud security controls, designing secure “Big Data” environments, and designing secure API integrations. Data solutions experience should include environments with mixed data sensitivity classifications, mixed role-based access requirements, and contractually constrained data.
A solid understanding of the following methodologies and processes is preferred: security auditing, incident handling, security controls for vendor hosted data and processing, developing security policies, developing security standards, documenting security processes.
Experience evaluating 3rd party security (Vendor risk management)
Experience in meeting regulatory compliance requirements (e.g., HIPAA, PCI, SOX, etc.). Familiarity with information security risk management frameworks (ISO 27001, NIST SP 800-37, NIST SP 800-53, etc.) and their application, and a working knowledge of the current security and privacy laws governing both the healthcare and insurance industries.
Experience with cloud security risk management; experience designing strategies and managing cloud vendors; Infrastructure as a Service, Platform as a Services, Software as a Service, etc.
Demonstrated understanding of complex systems integration issues involving many disparate data sources, and experience in resolving them through providing clear security direction on scope of solution.
Demonstrated leadership skills for large projects in a technology-oriented field with a high emphasis on communication and interpersonal relationship skills, and creative problem solving skills are required.
Experience with web application security standards, best practices, and verification, especially related to consumer-facing applications.
Experience with methodologies and technologies for protecting sensitive data while supporting a mobile workforce.
Please reach out to firstname.lastname@example.org if you are interested in this position!
Apply for Security Architect
Fill out the form below to submit your information for this opportunity. Please upload your resume as a doc, pdf, rtf or txt file. Your information will be processed as soon as possible.
Return to IT Job Search