Previous Job
Previous
IT Security
Ref No.: 18-07496
Location: Milwaukee, Wisconsin
Position Type:Direct Placement
Start Date: 09/24/2018
Genesis10 is currently seeking a IT Security Architect for a direct hire position working with a major healthcare provider in Menomonee Falls, WI.

Responsibilities:
As a senior member of Information Security team the enterprise security architect plays an integral role in defining and assessing the organization's security strategy, architecture and practices. The enterprise security architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services, evaluate and incorporate emerging technologies and evaluate changes to the threat landscapes. Interacts with senior leaders across the enterprise and acts as a trusted senior advisor. Position Responsibilities:
  • Develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
  • Develop security strategy plans and roadmaps based on sound enterprise architecture practices.
  • Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
  • Track developments and changes in the digital business and threat environments to ensure that they're adequately addressed in security strategy plans and architecture artifacts
  • Participate in application and infrastructure projects to provide security-planning advice
  • Draft security procedures and standards to be reviewed and approved by executive management and/or formally authorized by the CISO
  • Determine baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM)
  • Develop standards and practices for data encryption and tokenization in the organization, based on the organization's data classification criteria
  • Conduct or facilitate threat modeling of services and applications that tie to the risk and data associated with the service or application
  • Ensure a complete, accurate and valid inventory of all systems, infrastructure and applications that should be logged by the security information and event management (SIEM) or log management tool
  • Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, as well as counterparts within the network operations center (NOC)
  • Coordinate with the compliance office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization)
  • Validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable
  • Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems
  • Review network segmentation to ensure least privilege for network access
  • Liaise with the vendor management (VM) team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data:
    • Software as a service (SaaS) providers
    • Cloud/infrastructure as a service (IaaS) providers
    • Managed service providers (MSPs)

Qualifications:
  • Minimum of ten years of experience in a related field
  • Strong oral and presentation skills
  • In-depth knowledge of cybersecurity frameworks including but not limited to NIST CF, HITRUST CSF, ISO 27001
  • Strong knowledge of laws and regulations including but not limited to PCI-DSS, HIPAA-HITECH
  • Experience in using architecture methodologies such as SABSA, Zachman, or TOGAF
  • Direct, hands-on experience or strong working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
  • Strong working knowledge of vulnerability management practices and tools
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.
  • Direct experience designing IAM technologies and services such as AD, LDAP, and/or AWS IAM
  • Strong working knowledge of IT service management – ITIL related services – Change management, Configuration management, Asset management, Incident management, Problem management, etc.
  • Experience designing and securing applications and infrastructures in cloud environments such as AWS and/or Azure
  • Bachelors in Computer Science or similar degree is preferred.

If you are a qualified candidate interested in this opportunity, please apply.

About Genesis10:
Genesis10 is a leading U.S. business and technology consulting firm with hundreds of clients needing proven talent and solutions to power their strategic initiatives. If you are a high performing business or IT professional with solid, referenced experience, we want to meet you. Genesis10 recruiters and delivery professionals are highly accomplished career advocates, who get to know you beyond your resume to position you with the opportunities that fit your skills, experience and aspirations. We have benefit options to fit your needs and a support staff that works with you from placement throughout your engagement – project after project. To learn more about Genesis10 and to view all our available career opportunities, please visit us at www.genesis10.com.
"Genesis10 is an Equal Opportunity Employer, M/F/D/V”