HCL Global Systems Inc · 3 days ago
VITA - IT Security Architect 3 - 6 mo C-H (789914)
HCL Global Systems Inc is seeking an experienced Information Security Architect to join their IT Security team. The ideal candidate will be responsible for creating governance documentation for Security Tools and Services, performing security reviews, and developing a security risk management plan.
B2BConsultingHuman ResourcesInformation TechnologySoftwareStaffing Agency
Responsibilities
Identify and prioritize critical business functions in collaboration with organizational stakeholders
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Qualification
Required
In-depth knowledge of creating governance documentation for Security Tools and Services
Identify and prioritize critical business functions in collaboration with organizational stakeholders
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
Ability to map system configuration details to Security Policy Controls