Designs and oversees implementation of enterprise information security architectures and solutions; conducts deep-dive architectural assessments of various applications, systems, services, and processes to propose future state for the enterprise; supports the Division's security architecture program portfolio including but not limited to reference architecture, predictive analytics, architectural assessments, data mapping/visualization, gap analysis, system security plans, business continuity, c... more details
Designs and oversees implementation of enterprise information security architectures and solutions; conducts deep-dive architectural assessments of various applications, systems, services, and processes to propose future state for the enterprise; supports the Division's security architecture program portfolio including but not limited to reference architecture, predictive analytics, architectural assessments, data mapping/visualization, gap analysis, system security plans, business continuity, corrective action plans (CAPs), root cause analysis (RCAs), and modeling of systems and technology; monitors emerging products, technologies, and best practices that will improve security for the Division.
Required
Any combination of education and experience equivalent to a bachelor's degree in computer science, information technology, or a related field.
Six (6) years of progressively more responsible experience in solution architecture, systems analysis, design, or development, two (2) years of which shall have required independent judgment.
Advanced degree(s) beyond the minimum degree requirement in a relevant field may be considered for some experience.
Knowledge of theories, procedures, practices, materials, methods related to security architecture.
Knowledge in the use of modeling and roadmapping tools such as ABACUS.
Knowledge of DOFAF and TOGAF.
Knowledge of applicable local, state, and federal laws, regulations, and policies as related to information security.
Skill in creating architectural drawings and design documents.
Skill in threat modeling.
Ability to create formal and/or public documents.
Ability to present findings and speak in front of medium-sized audiences.
Ability to handle sensitive user data and information.
Ability to work independently and as part of a team.
Ability to communicate effectively, both orally and in writing and excellent presentation skills.
Preferred
Certified Information Systems Security Professional (CISSP).
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
Page Limit Reached
Paging is limited to 5 pages for our non registered users. To use this feature you must be Registered and Logged In.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.