What are the responsibilities and job description for the Cyber security architect position at Relig Staffing Inc?
Job Description
Job Description
Job Title : Cyber security architect
Location : Harrisburg, PA (Hybrid 1 week (3 / 4 days) onsite per month at clien)
30 months contract
JOB DESCRIPTION
Required Qualifications / Education
8 years of experience planning, designing, testing, implementing, and maintaining cybersecurity infrastructures for high-volume, consumer-ready platform required.
7 years as Cybersecurity architect for applications hosted in Azure required.
Experience in setting up and maintaining Azure AD with integration with SailPoint for IAM.
Job Duties
Plan, design, test, implement, and maintain the UBOS computer enterprise-class security systems and network security and infrastructure.
Develop a complete understanding of the program’s technology and information systems.
Lead the design and development of centralized access via Active Directory for all systems part of UBOS including Dynamics CRM, SAP S / 4 Hana, Manual Image Review, Cloud based Contact Center, Nuance Natural Language IVR system.
Align organizational security strategy and infrastructure with overall business and technology strategy.
Identify and communicate current and emerging security threats.
Design security architecture elements to mitigate threats as they emerge.
Plan, research, and design robust security architectures.
Perform or supervise vulnerability testing, risk analyses, and security assessments.
Create solutions that balance business requirements with information and cybersecurity requirements.
Ensuring compliance for penetration testing, SOC1 / SOC2, and PCI Level 1 compliance.
Design modern ways for ensuring PII data is protected in all environments.
Develop and maintain a productive working relationship with technology staff, business owners, project sponsors, vendors, and key clients.
Lead and participate in project team activities for system work efforts related to enterprise systems.
Work independently to accomplish the tasks and duties assigned.
Adhere to and follow all PTC standards, policies, and procedures.
Utilize various software and / or technology tools to perform job duties.
Perform tasks and other duties as related to this position and role and assigned by the PTC.
Additional nice to have :
Expertise in cloud-native security controls for Azure
Hands-on experience with IDS / IPS solutions (via firewall appliances or dedicated devices).
Experience with Zero Trust architecture and least privilege models for cloud security.
Strong knowledge of Microsoft Defender for Cloud, Azure Monitor, Log Analytics, and Purview DLP.
Proficiency in using CSPM tools (e.g. Microsoft Defender).
Experience in firewall configuration (e.g., Palo Alto NGFWs, Azure WAFs).
Strong knowledge of API security (e.g., Azure API Management, APIM, Palo Alto API routing).
Hands-on experience with vulnerability scanning tools like Tenable, Nessus, and Defender for Cloud.
Knowledge of CI / CD DevSecOps with experience in scanning pipelines for vulnerabilities Azure DevOps).
Strong expertise in IAM, RBAC, and Azure Policy enforcement.
Strong technical skills in incident response planning, execution, and playbook development.
Familiarity with Defender for Cloud, Microsoft CRSP, DART, and 3rd party ransomware recovery services.
Preferred Skills & Qualifications
Azure Security certifications such as AZ-500 (Microsoft Azure Security Engineer Associate) or CISSP, CCSP, or CEH.
Experience with cloud security posture management (CSPM) tools like AquaSec or Wiz.
Knowledge of container security and scanning (Docker, Kubernetes).
Familiarity with security frameworks and standards like CIS Controls, NIST, and ISO 27001.
Experience creating and delivering cloud security training and awareness programs.
Familiarity with Rapid Ransomware Recovery services and third-party incident response vendors.
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Cyber security architect?
Sign up to receive alerts about other jobs on the Cyber security architect career path by checking the boxes next to the positions that interest you.