Overview
On Site
Full Time
Skills
Security architecture
IT strategy
IT security
Management
Training
Multilingual
Regulatory Compliance
Information Technology
Continuous improvement
Information security
Distribution
Dashboard
Status reports
SOP
Process improvement
Exceed
Information systems
CISSP
Analytical skill
Problem solving
Documentation
Network
Enterprise architecture
SIEM
Artificial intelligence
Machine Learning (ML)
Evaluation
Roadmaps
Vulnerability assessment
Testing
Penetration testing
Business cases
Cyber security
Job Details
Job Description
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
- Engineer, implement and monitor security measures for the protection of computer systems, networks and information
- Develop and implement security policies and controls to support the Cyber Security framework
- Manage the existing cyber security training program across global, multilingual business
- Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
- Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
- Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
- Continuous improvement in the areas of Information Security technologies, techniques and processes
- Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
- Ability to interpret penetration test results and describe issues and fixes to non-security expert
- Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
- Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
- Bachelor s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP) - 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
- Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
- Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
- Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
- Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
- Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
- Vulnerability Assessment testing and/or Penetration Testing (preferred)
- Robotic Process Automation/Intelligent Automation (preferred)
- Business case development supporting security technology solutions (preferred)
- Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.