What are the responsibilities and job description for the Security Architect position at System Soft Technologies?
About Us:
System Soft Technologies is a premier technology company providing exceptional consulting services and solutions that drive innovation, enhance business value, and boost competitiveness. For over 25 years, we have built trusted partnerships with our clients, helping us grow into a $200MM enterprise. With the collective resources of over 1,200 associates covering the full spectrum of IT expertise, we anticipate and meet the unique needs of our clients, consistently delivering exceptional quality that exceeds expectations.
Job Summary:
The Position will work as a Security Observability Engineer Within the Division of Information Security and Will Assist with The Implementation, Integration, And Operationalizing Security Technologies. This Position Requires Experience in Information Security Architecture and Solution Design to Assist in The Strategic Planning, Designing, And Implementation of New Systems and Changes In Current Systems In A Secure Manner.
Responsibilities:
• Logging and Event Management – Ensuring That Appropriate Security Logs Are Ingested into The Siem and/or Log Aggrigation Platform and Properly Parsed to Support Security Operations
• Responsible For Planning, Designing, Development And Implementation Of Enterprise Security Architecture Solutions That Align With Business Goals And Risk Tolerance. Leveraging State Approved Processes And Technologies Wherever Possible.
• Lead Process Definition, Redesign and/or Technology Innovation Of Security Architecture, To Ensure Dis Solutions Support the Secure Delivery Of Enterprise Business Architecture And Services.
• Design, Deploy And Manage Countermeasures To Known Security Threats And Develop Preventative Mitigation Strategies For New And Emergent Threats To Enterprise Data, Networks, and Associated Services.
• Ensure, Validate And Measure The Consistent Application Of Protective Measures Throughout The Enterprise Business Application And Infrastructure Support Environments. Take Appropriate Action to Protect State Data and Technology Services.
Qualifications:
• Cyber Security Awareness and Understanding
• Experience with Linux, Windows, Network Security Protocols and Procedures
• Expert Understanding of Access Control, Logging and Reporting Systems
• Bachelor's Degree in An Information Technology or Information Security Related Field
• Eight Years of Relevant Work Experience May Be Substituted In Lieu Of Education
• Five Years of Experience in Supporting Large It Environments and/or System Deployments
System Soft Technologies is a proud equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, sexual orientation, or any other characteristic protected by law.