What are the responsibilities and job description for the Information Security Architect position at HexaQuEST Global, Inc.?
Position Summary
The BEST Program Security Architect will work with the BEST Security Lead, BEST Compliance Lead, BEST Technical Lead, Executive Office of Technology Services and Security (EOTSS) security team, and product vendors. The primary responsibility is to implement business and technical controls that meet specific security requirements and to define processes and standards that maintain approved security configurations in the new Financial Solution. This role ensures confidentiality, integrity, availability, risk management, and compliance of the business solution.
s a key member of the project's Security Team, the Security Architect will work closely with other team members to develop and implement a comprehensive information security program. This includes :
- Design and recommend protocols and procedures for monitoring the product vendor's performance against Service Level Agreement standards regarding data security, annual security audits, and disaster recovery testing.
- Define security policies, processes and standards related to end- user roles, data access for application users, and how users will be provisioned and de-provisioned.
- Provide input on selection, deployment, and oversight of security technologies.
The Security Architect will participate in recommending strategies for :
continuity, backups, and incident response.
to assess application vulnerability; and
The Software as a Solution (SaaS) model chosen by the Commonwealth includes data security protocols and procedures that are audited annually by a third party. The Service Level Agreement (SLA) and contract documentation between the Commonwealth and the system integration and product vendor outline the terms and conditions for maintaining data security, which will be monitored by the Commonwealth. The Security Architect will assist the Commonwealth in implementing necessary procedures to meet risk mitigation requirements and monitor vendor compliance with security protocols.
This role involves collaborating with program functional teams to identify end-user roles and permissions for implementing the new solution across in multiple agencies and user types, ensuring appropriate data access. User security procedures will be developed in conjunction with the BEST Security Lead, the system integration and product vendor, and agency staff responsible for user provisioning and deprovisioning. The Security Architect will report to the BEST Security Lead, who reports to the BEST Solution Technical Lead. Close coordination with the BEST Compliance Lead and the BEST program's Independent Verification and Validation (IV &V) vendor will be required.
This role is responsible for translating complex security problems into sound technical solutions, providing technical security and architectural direction to technology business teams, ensuring that development efforts are adhering to security design and compliance standards and requirements, providing insights and guidance on overall secure system design, and documenting and communicating security architectural requirements.
Specific Duties
This position will focus on the Platform (hosting) security and will align with the BEST security lead on application / user security, including but not limited to :
o Work with Executive OTSS to onboard Advantage 4 to work with the Commonwealth Single Sign On -SSO for employees and for vendors.
o Remediate department users that are not on mass.gov, to create a way for those department user access Advantage 4 when not on mass.gov.
o Will oversee security SLAs to ensure appropriate security reports are created, as well as create a process to for review to ensure SLAs are monitored by the Commonwealth.
o Work with EOTSS on and oversee security testing (pen-testing) and to review / remediate results / issues, as necessary.
o Work with the BEST Compliance Lead to develop strategies, procedures and recommended roles and responsibilities to enforce security requirements and address identified risks related to the use of the new Financials solution and suitability of underlying internal controls and technologies.
o Provide advice regarding end user security roles and groups, data access controls and security role
provisioning (onboarding) and de-provisioning (offboarding) protocols to ensure that data are accessed appropriately in the new Financials solution.
o Participate in disaster recovery, business continuity, back up, operational set up and configuration, as well as support disaster recovery / business continuity testing, documentation, and improvement.
o Oversee execution testing of Security Incident Event Management (SIEM) across several security domains including Cloud SaaS vendor, Comptroller's office, and EOTSS.
o Oversee integration testing of EOTSS Single Sign On (SSO), EOTSS Identify Access Management (IAM), EOTSS Multi-Factor Authentication (MFA), Cloud SaaS Vendor user access management, and Comptroller's access controls and provisioning processes.
o Implement agreed mitigations and solutions to address business and technology vulnerabilities.
o Document and implement technical controls, processes and procedures related to data security in conjunction with the BEST Security Lead, Technical Lead, Compliance Lead and Commonwealth Executive Office of Technology and Security Services (EOTSS).
o Assist security administrators and IT staff in the resolution of reported security incidents. Act as a liaison between incident response leads and subject matter experts. Monitor daily or weekly reports and security logs for unusual events.
Components of this activity include but are not limited to :
o Review of SLA requirements agreed to by the Commonwealth and the SI and product vendor(s).
o Review of Commonwealth IT policies related to data security.
o Review of Commonwealth Risk Management Office assessments and recommendations regarding data security risk mitigation.
o Conduct additional business system analysis as needed. Design future state security solution supporting data and application security needs and environment security needs across multiple stakeholders.
o Identify business and technology security vulnerabilities and make recommendations to program leadership and stakeholders.
Required Skills
Preferred Skills
Minimum Entrance Requirements