MVP CONSULTING PLUS
Architect - Security Over All Experience: 11+ years Overview: Bachelor's or Master's degree in Information Assurance, Computer Science, Information Systems or related field of study. Minimum 2+ years previous experience as a security architect. At least one certification is required including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+. Expert experience in architecting IAM solutions supporting multi-factor authentication, integrating with various authentication channels such as SAML as well as API driven integrations. Secures enterprise information by determining security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures. Sound understanding of Network Security, Network Configuration, Network Protocols, Networking Standards, Information Security Policies. High-level project management skills. Ability to solve complex system issues. Excellent customer service and communication (oral/written) skills required. Activities: Meeting with technology managers and the client team to discuss the goals and needs. Hands-on experience of IAM, LDAP and Splunk implementation. Subject-matter expertise across authentication technologies, specifically around the usage of multi-factor authentication solutions and their integration into end-to-end authentication strategies. Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues. Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designing public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation. Verifies security systems by developing and implementing test scripts. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements. Prepares system security reports by collecting, analyzing, and summarizing data and trends. Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. #J-18808-Ljbffr