|Date Posted||March 13, 2018|
Position type- Direct Hire
Location- Chicago, IL
Client- The #1 global leader in their space as a multi-billion revenue organization touching the lives of millions of people and influencing the largest global corporate decisions and policies. Very prestigious.
**Candidate referral program get moneiy (misspelled intentionally) for referring others to RED SKY Consulting--details below at end of job description.**
Bottom line - "In a Nutshell":
- Guide security decisions, and product choices for the company. Networking or software choices, around security. Implement it, to getting into place, Stabilize it where it can be at a run state and then hand off. Design, implement, and build then hand it over.
- Examples – Doing evaluation & recomendation of endpoint protection space, based upon internal needs and making a recommendation based on the environment and setting up tools & systems and deploying it, managing and running the deployment schedule.
- Network and security segmentation – Using a mixed solution using cisco security group tagging, fore scout, understanding advanced technologies doing evaluation and making a decision.
- Engage in Micro Segmantation, Seciruty Segmentation and Network Segmentation
- Understanding of tools and how to utilize them to make sure the end goal is met.
- Improve penetration and vulnerability management programs.
- Knowing Cisco networking is a big plus – they are a CISCO SHOP
Essential Job Functions
The Security Architect will be responsible for strategy, architecture, and security technology evaluations leveraging a deep comprehension of general information technology and a thorough understanding of the Firm’s technologies and systems. The Security Architect must be able to recommend ways to improve upon identified weak points via policies, procedures, and technologies. When implementing new security technology, the Security Architect will be responsible for managing all stages of the technology development lifecycle including determination of security requirements, leading proof-of-concepts, implementation, testing, and documentation.