requirement of security Architect in Troy, MI at Troy, Michigan, USA |
Email: amitsaini@hanstaffing.com |
From: Amit Saini, Han IT staffing amitsaini@hanstaffing.com Reply to: amitsaini@hanstaffing.com Role: Security Architect. Headcount: 1 Type of hire: Direct W2/ C2C Location: Troy, MI (hybrid 2-3 days onsite local candidates only). Visa: Independent. (can take H1B, Citizen, 1099) JD: Security Architect plays a crucial role in designing, implementing, and maintaining an organization's security infrastructure. Here are some key pointers for a Security Architect role: 1. Security Architecture & Design Develop and implement secure architectures for applications, networks, and cloud environments. Define and enforce security policies, standards, and frameworks (e.g., NIST, ISO 27001, CIS Benchmarks). Ensure secure by design principles are embedded in all IT projects and solutions. 2. Risk Management & Threat Modeling Conduct threat modeling and security risk assessments for systems and applications. Identify vulnerabilities and propose mitigation strategies (e.g., zero trust, least privilege, segmentation). Align security strategies with business risk appetite and compliance requirements. 3. Identity & Access Management (IAM) Implement role-based access control (RBAC) and least privilege access models. Design and integrate Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) solutions. Ensure strong authentication and authorization mechanisms for all systems. 4. Cloud Security Secure cloud environments (AWS, Azure, GCP) using native security controls and third-party solutions. Define and enforce cloud security best practices (e.g., identity security, logging, encryption). Implement container security (e.g., Kubernetes, Docker) and serverless security strategies. 5. Network & Endpoint Security Design secure network architectures with segmentation, firewalls, IDS/IPS, and Zero Trust principles. Implement endpoint security controls (e.g., EDR/XDR, anti-malware, DLP). Ensure secure remote access through VPNs, ZTNA, or SASE models. 6. Security Operations & Incident Response Work closely with SOC teams to ensure monitoring, detection, and response capabilities. Implement SIEM, SOAR, and threat intelligence solutions for proactive security. Ensure incident response plans are well-defined and tested regularly. 7. Compliance & Governance Ensure compliance with regulatory frameworks (e.g., GDPR, HIPAA, PCI-DSS). Implement security audits, vulnerability management, and continuous compliance monitoring. Conduct regular security awareness training for employees and stakeholders. 8. DevSecOps & Secure SDLC Integrate security into CI/CD pipelines (shift-left approach). Implement code scanning, SAST, DAST, and container security tools. Automate security testing and vulnerability management. 9. Emerging Technologies & Trends Stay updated on AI/ML in cybersecurity, blockchain security, quantum computing risks. Evaluate and implement security automation for threat detection and response. Research and recommend new security tools to enhance the security posture. 10. Leadership & Communication Collaborate with CISOs, IT teams, and business leaders to align security with business goals. Provide security guidance to architects, developers, and IT operations teams. Translate technical security risks into business impact for stakeholders. Keywords: continuous integration continuous deployment artificial intelligence machine learning information technology wtwo Michigan requirement of security Architect in Troy, MI amitsaini@hanstaffing.com https://jobs.nvoids.com/job_details.jsp?id=2260122 |
amitsaini@hanstaffing.com View All |
08:42 PM 17-Mar-25 |