Skip to content

IAM Architect

Remote
  • District of Columbia, District of Columbia, United States
IT Staffing

Job description

******Must have a solid understanding of OAuth, Sailpoint, SAML, and LDAP ********


JOB SUMMARY

This job takes a lead role in executing a process to develop a security architecture that processes information of various levels of sensitivity. The security architecture must be compliant with an existing enterprise technical security control requirements model. Produce a gap analysis documentation to identify any gaps between specific technical security requirements and the architecture of the system and provide detailed technical recommendations on appropriate mitigation measures. Advise and consult clients responsible for the architecture, design, implementation, and deployment of technical security controls on appropriate application of existing security services to solve their problems or enable new business opportunities. Research and evaluate new security technologies to be used as point solutions to gaps where the project is unable to take advantage of or needing greater functionality than reusable enterprise security services. The security architecture work will include network security, network defense, operating system security identity, authentication and authorization, data protection, application security, activity audit and monitoring, mobile computing security, and partner/vendor access to corporate systems/data. Mentors team members.

ESSENTIAL RESPONSIBILITIES

  • Enhance security team accomplishments and competence by leading delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members.
  • Determine most complex security requirements by evaluating business strategies and requirements; conducting system security and vulnerability analyses and risk assessments; identifying integration issues; preparing cost estimates.
  • Lead security systems by evaluating network and security technologies.
  • Implement security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures.
  • Implement security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures.
  • Enhance department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
  • Provide leadership and mentoring in the areas of expertise and architecture to peers, developers, management and business users including technical expertise, coaching, and ad-hoc training.
  • Support assurance compliance to required standards, procedures, guidelines and processes.
  • Experience designing solutions and executing on Identity and Access Management business requirements.
  • Other duties as assigned or requested.


Job requirements

REQUIRED EDUCATION

Bachelor’s Degree – Information Systems, Computer Science, Information Security, or Engineering

Substitutions

No substitutions

PREFERRED EDUCATION

Master’s Degree – Computer Science, Information Security, or related field

EXPERIENCE

Minimum:

  • 7-10 years' experience architecting solutions
  • 10-15 years' experience in Information Security
  • Experience communicating with business partners
  • Experience designing solutions and executing on Identity and Access Management business requirements.
  • Use of security patterns and security best patterns such as threat modeling
  • Solid understanding of OAuth, Sailpoint, SAML, and LDAP
  • Preferred:
  • 10 – 15 years' experience architecting solutions

KNOWLEDGE, SKILLS & ABILITIES

  • Business communication skills, both written and verbal and able to solve unconventional problems
  • Understanding of the TCP/IP protocol stack, application protocols such as SNMP, SMTP, DNS, and DHCP; IPSec and SSL VPNs; SSL/TLS protocol knowledge
  • Understanding of the information technology and information security industries, their current developments, trends, issues, and fundamental concepts
  • In-depth expertise in analyzing a wide spectrum of technical systems and services robustness and needs, and making practical recommendations to address them
  • Expert of web, mobile, and client application security vulnerabilities, attack methods, and countermeasures
  • Experience with common information security management frameworks, such as HITRUST, ISO 27001, CobiT, ITIL
  • Knowledge of ubiquitous encryption technologies (PGP, SSH, SSL, etc.) and common protocols (RADIUS, LDAP, KERBEROS, SAML, etc.)
  • Able to lead evaluations and recommend solutions to support enterprises security controls including: networking, firewalls, IDS/IPS, data loss prevention, application security, infrastructure security, and data security

or