Security Architect 2
Expertise in the risk and controls questionnaire-based risk identification, control evaluation, testing, sampling methodologies, technology controls, audit engagement processes, controls substantiation. General knowledge of the Secure Application Development Lifecycle (SADLC) and the Software Development Lifecycle (SDLC) processes and practices.
Excellent analytical and problem-solving skills Self-motivated with strong attention to detail Excellent verbal and written communication skills. Top Skills & Years of Experience: 5+ years of experience with cybersecurity related job functions.
Strong knowledge of - NIST SP800-53 Rev 4 & 5, HIPAA, FERPA, etc. IaaS, PaaS, SaaS Willingness to serve as a risk management expert providing meaningful input to ensure risk drivers are appropriately considered, assessed, and prioritized. Expertise in the risk and controls questionnaire-based risk identification, control evaluation, testing, sampling methodologies, technology controls, audit engagement processes, controls substantiation.
Preferred: Bachelor's Degree in cybersecurity or related field is highly preferred, Cybersecurity certifications are a plus Knowledge/Skills: In-depth knowledge and understanding of compliance practices and methodologies, including risk assessment, monitoring, surveillance, and testing activities.
Desire to work in a collaborative environment, develop and drive strategic direction contribute day-to-day on implementing tactical solutions. Strong knowledge and understanding of compliance regulations and their related frameworks, such as: NIST SP800-53 Rev 4 & 5 Criminal Justice Information Services (CJIS) Security Policy.
Version 5.9 The Privacy Act of 1974 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The Family Educational Rights and Privacy Act (FERPA) Experience: 5+ years of experience with cybersecurity related job functions. Strong knowledge and understanding of information technology systems and services to include: Virtualization Containerization (Docker) Cloud Hosting Operations and Technologies IaaS, PaaS, SaaS Windows Workstations/Servers Functionalities Linux Server Functionalities Identification and Authentication processes and technologies (SSO/Reverse Proxies) Encryption and Cryptography Disaster Recovery and Business Continuity processes Computer Networking Qualification:Preferred: Bachelor's Degree in cybersecurity or related field is highly preferred, Cybersecurity certifications are a plus Required Skills : Risk ManagementAdditional Skills : Technical Writer