Security Architect . ( 051612 ANTWAR)
Location : Atlanta
Duration 6 months
Rate : Competitive
Visa Status: H1 and C2C Candidates are ok for this
The Security Architect will implement and manage the technologies utilized by Atlanta Housing Authority to provide directory services for enterprise applications (YARDI, Oracle, Messaging, Remote Access, and SharePoint). This includes setting and implementing the governance around schema modifications, implementation methods, integration methods, lifecycle management, federation, and ensuring all components are operating as expected. Accountabilities:
1. Plan, organize and design the infrastructure for enterprise-wide directory services.
2. Collaborate with Application and Infrastructure teams and provide architectural and technical guidance as well as oversight for directory services, single sign-on, federation, and remote access.
3. Ensure AHA’s directory implementations meet the agency’s tactical and strategic goals and the designs meet prescribed information systems best practices and standards.
4. Review and make recommendations for improvements in the agency’s existing directory infrastructure.5. Implement security controls for applications and services using directory services as a means of authentication, authorization, and an organizational information store.
5. Assist in developing a long term strategy and vision for directory services and management tools.
6. Develop an integrated and comprehensive solution for managing identities and credentials.
7. Act as lead technical advisor for enterprise-wide directory services' architecture, integration, compatibility and customization, including design development and system implementation.
8. Lead, create, manage, and participate in the analysis, planning, design, implementation, and maintenance of software and 3rd part products pertaining to Atlanta Housing Authority's information security environment.
9. Lead the integration of new software and hardware into current system and tests to ensure accuracy and efficiency.
10. Develop and oversee testing strategies to ensure rigorous testing and validation of security systems prior to production.
11. Analyze existing, new, and emerging technologies for appropriateness, fit, and functionality with our current and future technologies, and our IT Strategic Plan.
12. Interface with vendors to assess their competency and ongoing support abilities and integration into our security framework.
13. Works closely with IT teams including but not limited to Engineering, Architecture, Operations, Network, and Data Management, to establish and operationalize solutions within the Information Security Framework.
14. Engineer security roles for highly privileged account usage
Required Qualifications:
1. Bachelor's degree in Computer Science, MIS, Technology or related field and minimum of 6 years IT security and identity management experience in a Windows 2008 R2 environment. Or, (in lieu of degree) 10 years IT security and identity management experience in a Windows 2008 R2 environment.
2. 4+ years recent experience with user provisioning (i.e. workflow and process design and modeling) with any IAM web-based suite (i.e. Quest, CA, Sun IAM, Oracle CoreID) for enterprise wide systems, single sign-on solutions for internal and external users, Active Directory Federated Services (ADFS), directory integration and/or design
3. 2+ years’ experience implementing enterprise-wide role based access control solutions
4. Knowledge of RBAC / ABAC authorization patterns and experience or understanding of XACML
5. Capable of developing custom web services and knowledge of SOAP security practices
6. Advanced technical knowledge of directory technologies (Active Directory, Federation Services, etc.) through the use of standard protocols (Kerberos, LDAP, LDAPS, etc.)
7. Understanding of the components that provide directory management like Users and Computers, LDAP management tools, GPO, etc.
8. Must have a clear understanding of current information security theory and design, including Identity and Access management, Threat and Vulnerability management and Policy, Compliance and Architecture.
9. Demonstrated ability to translate technical security issues into appropriate audience language and
demonstrated effective negotiation skills
10. Proven ability and commitment to being discreet, tactful, timely, and operating judiciously when addressing internal and external customer needs.
Preferred Qualifications: 1. CISSP, CISM, and Microsoft certification(s) preferred. 2. Background and experience in multiple security concepts, and technologies.
3. Ability to motivate individuals and teams 4. Possess strong coordination, organization and liaison skills to help consult, seek and gain consensus
on solutions to complex security issues.
No comments:
Post a Comment