Vacancy expired!
IO Datasphere, Inc. has been providing project management, software development and IT staff augmentation services to our clients in the Midwest and throughout the U.S. since 1996. We are an approved vendor on contract to provide software development and IT staff augmentation services for the States of Illinois, Michigan, Minnesota, Iowa, and Wisconsin. We also provide these services to businesses, as well as local and county governments, in the Midwest and nationwide. Our client is looking for an IT Security Architect. Requirements
- Desire to work in a collaborative environment, develop and drive strategic direction contribute day-to-day on implementing tactical solutions.
- Strong knowledge and understanding of compliance regulations and their related frameworks, such as:
- NIST SP800-53 Rev 4 & 5
- Criminal Justice Information Services (CJIS) Security Policy. Version 5.9
- The Privacy Act of 1974
- The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- The Family Educational Rights and Privacy Act (FERPA)
- Willingness to serve as a risk management expert providing meaningful input to ensure risk drivers are appropriately considered, assessed, and prioritized.
- Evaluate the appropriateness of the audit response to changes in risk ratings.
- Expertise in the risk and controls questionnaire-based risk identification, control evaluation, testing, sampling methodologies, technology controls, audit engagement processes, controls substantiation.
- General knowledge of the Secure Application Development Lifecycle (SADLC) and the Software Development Lifecycle (SDLC) processes and practices.
- Excellent analytical and problem-solving skills
- Self-motivated with strong attention to detail
- Excellent verbal and written communication skills.
- 5+ years - Experience with cybersecurity related job functions.
- Strong knowledge of - NIST SP800-53 Rev 4 & 5, HIPAA, FERPA
- Experience with IaaS, PaaS and SaaS
- Virtualization
- Containerization (Docker)
- Cloud Hosting Operations and Technologies
- IaaS, PaaS, SaaS
- Windows Workstations/Servers Functionalities
- Linux Server Functionalities
- Identification and Authentication processes and technologies (SSO/Reverse Proxies)
- Encryption and Cryptography
- Disaster Recovery and Business Continuity processes
- In-depth knowledge and understanding of compliance practices and methodologies, including risk assessment, monitoring, surveillance, and testing activities.
- Experience leading cyber security initiatives and projects.
- Bachelor’s Degree in cybersecurity or related field
- Cybersecurity certifications
- Experience with Criminal Justice Information systems Security Policy