Cybersecurity Architect I / II - Hybrid Accounting - Chicago, IL at Geebo

Cybersecurity Architect I / II - Hybrid

Cybersecurity Architect I / II Location:
Austin, TX or Chicago, IL (Onsite 3x a week) Type:
Direct Hire Bottom Line / In a Nutshell:
Minimum 5-10
years of experience in Information Technology operational and/or engineering roles At least 3
years of experience in IT security, compliance, or risk management developing and deploying security technologies, policies, standards, and procedures. Bachelor's degree or better in Cyber Security or similar is preferred CISSP, CISM and technically focused certifications is preferred Understanding of industry standard frameworks such as ISO 27001, NIST 800-53, CSF, CIS, ATT&CK Matrix Experience with Azure cloud would be ideal For Level II candidate, looking for leadership type qualities, more of a lead than people manager but looking for maturity, mentorship skills, etc.
Job Description:
The Cyber Security Architect I / II role is part of the Security Governance department and reports to the Director of Cyber Security Architecture and Forensics. The Security Governance department leads in protecting the firm from Cyber and Physical threats, and assists with assuring compliance to contractual, legal, and ethical requirements. Risk to the firm is reduced by providing clear direction for the secure delivery of technology, active identification of risks, and rapid response to threats. Security Governance is led by the CSO who reports to the CAO and works directly with the firm's General Counsel.As part of the Cyber Security Architecture & Forensics team, the Cyber Security Architect has the following firmwide
Responsibilities:
Level I Candidate:
Evaluating and implementing new technologies, technical configurations, and policies and standards. Evaluating currently deployed technologies against established good practices and providing reasoned recommendations for improvements. Ensuring delivery of project goals and strong hand over practices to operational teams. Assisting with defining security reference architecture. Participating in the development and delivery of the firmwide cyber security strategy. Providing input in the assessment of enterprise cyber risk. Supporting investigations and incident response activities. Writing technical documentation. Level II Candidate:
Leading in the development and delivery of the firmwide cyber security strategy. Providing input in the assessment of enterprise cyber risk. Leading the evaluation and implementation of new technologies, technical configurations, and policies and standards. Evaluating currently deployed technologies against established good practices and providing reasoned recommendations for improvements. Overseeing delivery of project goals and strong hand over practices to operational teams. Defining security reference architecture. Supporting investigations and incident response activities. Writing technical documentation. Qualifications & RequirementsThe following experience and education do not need to be consecutive and is preferred. Any combination of experience, education, & certification that demonstrates that the candidate can be successful in the position will be considered.
Experience:
Level I Candidate:
Minimum five (5) years of experience in Information Technology operational and/or engineering roles of which at least three (3) years of experience in IT security, compliance, or risk management developing and deploying security technologies, policies, standards, and procedures.Level II Candidate:
Minimum ten (10) years of experience in Information Technology operational and/or engineering roles of which at least three (3) years of experience in IT security, compliance, or risk management developing and deploying security technologies, policies, standards, and procedures. Understanding of industry standard frameworks such as ISO 27001, NIST 800-53, CSF, CIS, ATT&CK Matrix. Technologies:
Advanced Endpoint Security Agent Based Data Loss Prevention (Host DLP) Application AllowBlocklisting Azure IaaS & PaaS Security Cloud Access Security Broker (CASB) Cloud Security Posture Management (CSPM) M365 Security Suite Network IPS/IDS Next Generation Firewall Privileged Access Management SIEM Vulnerability Management Web Application Firewall (WAF) Education & Professional Certification:
Bachelor's degree or better in Cyber Security or similar is preferred. CISSP, CISM and technically focused certifications is preferred. Core Skills:
CommunicationDeveloping organizational mission, objectives, milestones, and plans with little supervision. Independent and persuasive business writing. Listening, understanding, and articulating technical and non-technical information (both written and oral formats) to customers, peers and/or management in a one-on-one or team context with some oversight. Effective production support activities, including technical writing and the creation of documentation, training, and other communications without frequent supervision. Has developed active listening skills. Decision MakingProduces effective and practical decisions and problem solutions based on a mixture of analysis, experience, and judgment. Provides innovative and insightful ideas. Perceives the cross impact on other engagements. Determines personnel needs and staffing. Interpersonal SkillsCapable of defusing complex interpersonal issues effectively. Negotiates skillfully in very difficult situations with both internal and external groups. Inspires and motivates. Recognized as a positive and motivational leader on the team. Strategic/Change LeadershipBuilds strategy and focuses on six months to one-year plans. Contributes individually or through others on complex issues or initiatives. Facilitates group progress on complex issues and initiatives. Program/Project Management Spearheads complex programs that span multiple inter-organizational units and clients.Interfaces with senior management.THIS IS A GREAT OPPORTUNITY WITH A FIRST-CLASS COMPANY Recommended Skills Active Listening Application Firewall Architecture Business Correspondence Certified Information Security Manager Certified Information Systems Security Professional Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.