Senior Security Architect

As a Senior Security Architect you will support the discovery of information protection needs, definition of security requirements and the design of enterprise and system-level security architecture. Security architecture aligns and integrates with Enterprise Architecture, and ensures the protection of the Federal client?s information and IT assets across multiple operational, service, standards and project viewpoints.
+ Serve as subject matter expert on emerging information security trends and protection capabilities.
+ Assist the clients in maintaining awareness of security products, tools, standards, best practices, and services which could provide new capabilities or enhance cybersecurity
+ Analyze, document, and recommend specific applications, incorporating considerations of the current architecture and cost-benefit, to enhance the cybersecurity posture of the client and reduce risk to the enterprise.
+ Prepare testing and deployment plans for monitoring, endpoint, and server applications, including resource, communication, testing, and support planning.
+ Coordinate with internal stakeholders to resolve technical issues associated with planned or ongoing deployments
+ Administer Windows and Linux-based IT security applications for endpoint and servers.
+ Design system security architecture by conducting functional analysis, reviewing candidate architectures, allocating security services, and selecting security mechanisms.
+ Research, develop and maintain the Federal Agency enterprise and system-level security architecture documents, drawings and requirements mapping for major applications, general support systems, DevOps environments, cloud-based solutions, mobility and remote access solutions.
+ 10+ years of experience in information security, IT architecture, or related discipline
+ Master?s degree or equivalent
+ Any one of the following: (CISSP) Information System Security Engineer (ISSE) or Certified Information Systems Security Professional (CISSP) Information System Security Architect (ISSA) or comparable certification
+ U.S. citizenship required, active DHS/Secret clearance a plus
+ Experience with security technologies including but not exclusively, authentication services, firewalls, application white listing, server configuration control, logging and monitoring tools, anti-malware and intrusion prevention systems
+ Hands-on experience with security features and system administration of Linux and Windows
+ Must have an understanding of security vulnerabilities and knowledge of remediation procedures in common operating systems, web and applications servers, network switching and filtering, routers and firewalls
+ Experience analyzing information system and security requirements and making security recommendations based on business objectives.
Founded in 2004, eGlobalTech (eGT) is a leading management and IT consulting firm in the Washington, D.C. metropolitan area. Our focus is to provide the public sector with innovative solutions, leveraging cutting-edge tools and methodologies to meet the Government?s most pressing business needs. To achieve this objective, our core practice areas ? strategy, IT solutions development, cyber security, and cloud computing ? are integrated to provide clients with comprehensive end-to-end results. This integration enables our highly motivated teams to thrive in a culture that encourages out-of-the-box thinking, collaboration and an environment where you can excel. For more information, please visit our website at www.eglobaltech.com
Equal Employment Opportunity:
eGlobalTech is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, gender, age, status as a protected veteran, sexual orientation, gender identity, or status as a qualified individual with a disability. EEO is the Law
Status: Current 9062106f7c964eceaa7152becd2e1ec6

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.