Home

Security Architect | Boston, MA 02108 (Hybrid) at Boston, Massachusetts, USA
Email: [email protected]
Hello,  

Hope you are doing well.

My name is Rajdeep Shaw from Clovity Inc. and I am actively looking for a suitable candidate to fill the below given position with my direct client. If you or someone you know is available & interested, please reach me back as soon as possible for further proceedings.

Job Title:
Security Architect

Job Location:
 Boston, MA 02108 (Hybrid)

Duration:
Long Term

Preferred: Any State or Government project

Need local resources from MA, CT, RI, ME, VT, NH only

4 days in a month on-site

Questionnaire:

How many years of direct experience does the candidate have in implementing business and technical controls to meet specific security requirements of a large, complex organization

How many years of experience does the candidate have implementing and supporting such controls within a Software as a Solution (SaaS) IT environment

Please list any relevant professional certifications the candidate has.

This position will focus on the Platform (hosting) security and will align with the BEST security lead on application/user security, including but not limited to:

Work with Executive OTSS to onboard Advantage 4 to work with the Commonwealth Single Sign On -SSO for employees and for vendors.

Remediate department users that are not on mass.gov, to create a way for those department user access Advantage 4 when not on mass.gov.

Will oversee security SLAs to ensure appropriate security reports are created, as well as create a process to for review to ensure SLAs are monitored by the Commonwealth.

Work with EOTSS on and oversee security testing (pen-testing) and to review/remediate results/issues, as necessary.

Work with the BEST Compliance Lead to develop strategies, procedures and recommended roles and responsibilities to enforce security requirements and address identified risks related to the use of the new Financials solution and suitability of underlying internal controls and technologies.

Provide advice regarding end user security roles and groups, data access controls and security role provisioning (onboarding) and de-provisioning (offboarding) protocols to ensure that data are accessed appropriately in the new Financials solution.

Participate in disaster recovery, business continuity, back up, operational set up and configuration, as well as support disaster recovery/business continuity testing, documentation, and improvement.

Oversee execution testing of Security Incident Event Management (SIEM) across several security domains including Cloud SaaS vendor, Comptrollers office, and EOTSS.

Oversee integration testing of EOTSS Single Sign On (SSO), EOTSS Identify Access Management (IAM), EOTSS Multi-Factor Authentication (MFA), Cloud SaaS Vendor user access management, and Comptrollers access controls and provisioning processes.

Implement agreed mitigations and solutions to address business and technology vulnerabilities.

Document and implement technical controls, processes and procedures related to data security in conjunction with the BEST Security Lead, Technical Lead, Compliance Lead and Commonwealth Executive Office of Technology and Security Services (EOTSS).

Assist security administrators and IT staff in the resolution of reported security incidents. Act as a liaison between incident response leads and subject matter experts. Monitor daily or weekly reports and security logs for unusual events.

Assist in identifying security requirements, using methods that may include risk and business impact assessments.

Components of this activity include but are not limited to:

Review of SLA requirements agreed to by the Commonwealth and the SI and product vendor(s).

Review of Commonwealth IT policies related to data security.

Review of Commonwealth Risk Management Office assessments and recommendations regarding data security risk mitigation.

Conduct additional business system analysis as needed. Design future state security solution supporting data and application security needs and environment security needs across multiple stakeholders.

Identify business and technology security vulnerabilities and make recommendations to program leadership and stakeholders.

Working with the BEST Compliance Lead, assess compliance with risk and cybersecurity frameworks and standards such as NIST, ISO, COSO, PCI, FERPA, and GLBA.

Assist in the coordination and completion of information security operations documentation.

Play an advisory role in application development and implementation to assess security requirements and controls and assist in assuring that security issues are addressed throughout the project life cycle.

Support the Program and the BEST Security Lead to identify approved end users of the new solution and coordinate provisioning of users for Day One go live. Drive testing of go live security solution end-to-end.

Provide advice to security administrators on normal and exception-based processing of security authorization requests including the use of system integration or product vendor tools that monitor system use and data access irregularities.

Research, evaluate and recommend information-security-related hardware and software, including developing business cases for security investments.

Analyze the result of system integration and product vendor audits or audits performed by third parties to produce recommendations of acceptable risks and risk mitigation strategies regarding security. Provide recommendations regarding audit finding remediation, including providing feedback and suggestions on managerial responses to findings, tracking progress and providing status updates to the BEST Team.

Provide ongoing advice and third-level support to Security operations and IT for incident response, indicators of compromise (IOCs), vendors security vulnerability notifications, law Enforcement security alerts, etc.

Maintain an awareness of existing and proposed security-standard-setting groups, state and federal legislation and regulations pertaining to information security. Identify regulatory changes that will affect information security policy, standards, and procedures, and recommend appropriate changes.

Research and assess new threats and security alerts and recommends remedial actions.

Work with BEST Operations Lead to ensure security operational actions are properly implemented.

Assist/support BEST Technical Implementation Lead on Authority to Operate (ATO) requirements identification, definition, and validation.

Execute tabletop security reviews of end-to-end go live security processes.

REQUIRED SKILLS:

In-depth exposure to technical configurations, technologies, and processing environments in one or more projects of similar size and complexity to BEST.

In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls.

Knowledge of and experience in developing and documenting security architecture and plans, including strategic,

tactical and project plans.

Documented experience with common information security management frameworks, such as International Organization for Standardization (ISO) 2700x and the ITIL, SOX, COBIT and National Institute of Standards and Technology (NIST) frameworks.

Experience in architecting and implementing cloud-based security solutions.

Strong knowledge of security tools and capabilities, such as: IDM and SSO.

Extensive experience in integrating security tools and 3rd party vendor solutions.

Exceptional planning, organization, communication, prioritization, and business analysis skills.

In-depth knowledge of risk assessment methods and technologies.

Proficiency in performing risk, business impact, control, and vulnerability assessments.

Excellent technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, identity, and access management (IAM) systems, anti-malware solutions, privilege access management (PAM), data loss prevention (DLP), encryption at-rest and in-transit, multi-factor authentication (MFA), end-point-security, vulnerability scanning and patch management, automated policy compliance tools, and desktop security tools.

Experience in developing, documenting, and maintaining security policies, processes, procedures, and standards.

Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.

Strong analytical skills to analyze security requirements and relate them to appropriate security controls.

Documented written and verbal communication skills.

PREFERRED SKILLS:

Experience with Software as a Service cloud implementations particularly those in which legacy on premise applications have been migrated to cloud delivery options.

Security solution design and development leveraging multiple security teams with disparate roles and responsibilities using a cloud SaaS solution.

Experience in migrating security solutions from legacy on-premises environment into a cloud solution within a highly regulated environment.

Experience in performing / supporting security audits and compliance validation.

Documented ability to interact with personnel at all levels and across all business units and organizations, and to comprehend business imperatives.

MINIMUM ENTRANCE REQUIREMENTS:

Bachelor's degree in computer science, system analysis or a related study, or equivalent experience.

Minimum of five years of design and implementation experience in IT, with a deep knowledge in a minimum of two of the following technical disciplines: infrastructure and network design, application development, application programming interfaces (APIs), middleware, servers and storage, database management, data security, and system administration and operations

Experience in generation of Security materials, including but not limited to compliance adherence, security operational procedures, security implementation plans, and network and security diagrams.

Minimum of three years of security architecting design and implementation with security certifications, such as:

SIA Security +

Thanks and Regards

Rajdeep shaw  

Clovity
 | 
www.clovity.com

Email:

rajdeeps
@clovity.com

LinkedIn:

https://www.linkedin.com/in/rajdeep-shaw-39a615249/

An E-verify Employer

--

Keywords: access management information technology golang Connecticut Delaware Massachusetts New Hampshire Rhode Island Vermont
Security Architect | Boston, MA 02108 (Hybrid)
[email protected]
[email protected]
View all
Wed Jun 12 20:26:00 UTC 2024

To remove this job post send "job_kill 1474261" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 25

Location: Boston, Massachusetts