Data Security Architect - Plano, United States - Motion Recruitment

    Motion Recruitment background
    Description

    Position Overview:


    Our client is a leader in their industry and want team members that have a strong ability to collaborate to design, construct, implement, and support technology solutions to help propel them even further in their industry.


    Details:


    This is a 6+ month contract opportunity to start with opportunity for contract extension and/or conversion to an internal employee.

    Contract/Consulting work is

    full-time, 40 hours/week Monday to Friday.

    Our client works on a hybrid schedule, on-site 3 days/week and once integrated with the team there is more flexibility for remote work.

    Please check the compensation section of this job posting and apply if it aligns with your target hourly rate.


    Please note:


    Our client is going through a transformation right now and is evolving from a "Mom & Pop" environment to an enterprise environment, building out a data warehouse and data architecture from scratch.

    Major data and application modernization efforts.

    As an Information Data Security Architect,


    you will be involved with evolving our client's technical security strategy and architecture for both the data and application modernization efforts by developing solutions, frameworks, and plans in order to meet growing and evolving needs.

    You will work closely with other Info Security team members, Data Leadership, Application Leadership, and IT Operations as well as Business Stakeholders as part of a comprehensive info security program, to include defining security policies, processes, and standards.

    In coordination with other Leaders you will be part of selecting and deploying technical controls to meet specific security requirements, and define processes and standards to ensure that security configurations are maintained and created with the right business purpose in mind.

    You will provide expertise to provide architectural direction for multiple, concurrent projects.


    Security / Development:


    Serves as a security expert in application development, network, and / or platform (operating system) efforts helping project teams comply with enterprise and IT security policies and best practices.

    Expertise in information security architecture and risk assessment with a strong understanding of application security, OWASP and application security testing tools.

    Along with the Leadership Team review and approve the application of secure-by-design principles in architectural designs, dataflow diagrams, infrastructure diagrams as needed.

    Researches, designs, and advocates new technologies, architectures, and security products in support of the client's security requirements and roadmap

    Helps develop security processes and procedures, and supports service-level agreements (SLAs) to ensure that security controls are managed and maintained.

    Ensures security solutions being developed across the client's business units are aligned to enterprise security standards and principles, and are leveraging common solutions and services and meeting the internal / external threats.


    Strategy:


    Provides architectural strategy and subject matter expertise in a broad range of IT security disciplines, including network security, data protection, malware defenses, security analytics, identity and access management, compliance, endpoint and mobile security, third-party software-as-a-service integration, infrastructure as a service, cloud, and secure coding lifecycle.

    Works closely with business stakeholders and other Leaders to help develop technically feasible long-term IT strategies and plans and develop strategies and plans to enforce security requirements and address identified risks.

    Ensures execution of multi-year strategies and alignment of projects, tasks, and framework to the strategic security roadmap, specifically as it relates to Data and Application Security.

    Works closely with the other technology architects to ensure that security is properly provisioned in their technology domains and patterns

    Determines security requirements with Application and Data build opportunities in mind by evaluating business strategies and requirements, researching information security standards, conducting system security and vulnerability analyses, and risk assessments as needed with the Security Leadership and Operations team.

    \

    Preferred Education and Experience
    A related degree or comparable formal training, certification, or work experience.
    Experience in / knowledge of developing and documenting security architecture and plans, including strategic, tactical and project plans.
    3+ years experience in Data Architecture and Data Security, including experience developing data personas and data access policies
    Preferred knowledge and or experience with applications of common information security management frameworks, such as International Organization for Standardization (ISO) 27001/2 and the ITIL, COBIT, and National Institute of Standards and Technology (NIST) frameworks

    Certification with Azure Security is a plus and exposure or Data Science Council of America (DASCA) or Senior Data Architect (SDA) Certification is a nice to have.


    Scripting/ programming experience:
    Python, Docker is preferred.
    Expertise in secure coding practices, threat modeling, security architecture, vulnerability management, enterprise security, application security, incident management, security incident, networking, information technology operations
    Expertise in data-protection software and hardware solutions including application, database, and file level encryption and tokenization solutions,

    Experience as a Security Architect involving various Cloud and / or Mobile and integration technologies with consideration for Security around Data and Applications (internal and external).

    Experience with security architecture reviews, risk assessments, and developing security requirements.
    Experience with server security as it relates to web servers, app servers, PKI, OWASP Top 10, etc.

    Ability to understand the financial impacts of technology decisions related to both cloud and security and provide solutions based on business need that allow for collaboration and decisioning with Leadership for the right solution.

    Preferred Key Competencies
    Excellent technical knowledge of mainstream operating systems (e.g., MS Windows, Macintosh, Linux) and a wide range of security technologies, such as network security appliances, identity and access management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security tools
    Knowledge of data-protection mechanisms.
    Exposure to key management protocols and techniques of effective key management.
    Excellent speaking, presentation, and writing skills

    Ability to understand the customer's business problem, need, or opportunity and to design an IS solution that appropriately addresses it.

    #J-18808-Ljbffr