What are the responsibilities and job description for the Cloud Security Architect :: Omaha, NE, Berkeley Heights, NJ, or Frisco, TX (100% Onsite) position at Data Wave Technologies Inc?
Job Details
Cloud Security Architect
Omaha, NE, Berkeley Heights, NJ, or Frisco, TX (100% Onsite - local only, no relocation)
Fulltime
Required:
Design Azure Cloud Security Solutions.
Lead architecture reviews for decision records.
Cover IAM (Entra ID/Azure Active Directory), posture management, workload protection, SIEM/SOAR, and application testing.
Architectural Runway and Collaboration.
Create infosec requirements for infrastructure and app development.
Collaborate with agile teams to meet security needs.
Continuous Monitoring and Compliance.
Monitor cybersecurity policies, compliance artifacts, and systems authorization.
Map security controls to compliance requirements.
Zero-Trust Implementation.
Integrate Azure Zero-Trust Architecture into cloud solution design.
Risk Mitigation and Vulnerability Remediation.
Coordinate risk reduction e orts for applications and infrastructure.
Hybrid Cloud Deployment.
Deploy FedRAMP High hybrid cloud solutions, integrating on-premises components.
Threat Assessment and Incident Response:
Assess vulnerabilities and provide incident support.
Must possess Azure Expertise:
Microsoft Azure Cloud experience (GovCloud preferred).
Familiarity with Azure security tools/platforms (e.g., Azure AD, Sentinel, Defender, Monitor, Key Vault).
5 years of cyber-related experience in a commercial environment with Azure, focusing on technical information security and risk management.
Must have experience with Security Pro ciency: Identity Access and Management concepts (including multifactor authentication and SSO/Federation), Privileged Access, Vulnerability testing for Azure, Understanding of CI/CD pipelines and software
Cloud Security Domains experience: Demonstrated expertise in Information Security and Risk Management across Windows and Linux
Familiarity with key domains: Identity, Credential, and Access Management (ICAM), Authentication and Authorization (including SSO and Identity Federation), Zero-Trust, Defense-In-Depth, Governance and Compliance. Data Security, Operating System Security, Network Layer Protection, Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response, Cloud Core Platform (Compute, Storage, Networking).
Education:
Bachelor's degree in a technology eld (Master's degree preferred).