Full-Time

Information Security Data Architect

Ask IT Consulting

Ask IT Consulting

No salary listed

Columbia, SC, USA

In Person

Category
Data & Analytics (1)
Required Skills
Juniper
Operating Systems
Role-based Access Control
Linux/Unix
Requirements
  • Expert level security information architecture
  • Expert level Identity Access Management
  • Background and previous experience deploying privileged user management across a distributed enterprise environment
  • Background and previous experience deploying data discovery and data loss prevention across a distributed enterprise environment
  • Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web applications, databases, strong authentication, operating systems and network security protocols and procedures
  • Expert understanding of information, computer and network security
  • Expert understanding of user access permissions and role based access controls
  • Expert understanding of access control logging and reporting systems
Responsibilities
  • Assist Division of Information Security with the implementation and integration of privileged user management, data classification, data loss prevention and security systems
  • Develop plans for implementation and integration within existing division and agency infrastructure
  • Develop repeatable guides for standard implementation and assist agencies as needed to incorporate systems
  • Work with existing staff to architect and deploy Privileged User Management, data classification, Data Loss Prevention and security systems in a highly complex distributed enterprise environment
  • Create customized solutions to integrate file systems, storage arrays, databases, VPN, file services, etc., into a holistic enterprise solution for access control and data identification/loss prevention
  • Implement and develop guiding documentation for Division of Information Security and multiple agencies
  • Develop repeatable installation and configuration documentation to assist deployment teams and agencies that wish to install approved security solution within their agencies
  • Assist as necessary agencies in the deployment, configuration, operation and sustainment of security systems
  • Work with Security Operations Center to identify enhanced data collection and correlation capabilities in existing data and gaps in data collection/analysis architecture, systems and procedures
  • Identify and develop solutions for preventing, detecting and mitigating risks to information and information systems
  • Conduct training as necessary to division and agency personnel on security processes, procedures and methodologies to ensure security event information is properly identified, correlated, documented and mitigated in accordance with department standards
Ask IT Consulting

Ask IT Consulting

View

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A