e.g. job, company, title
e.g. city, state or ZIP code
advanced search »

IT Security Architect

Location:
West End, PA
Company:
Pennsylvania Higher Education Assistance Agency

Description

The Pennsylvania Higher Education Assistance Agency (PHEAA) has a tremendous vision to provide funding to students for higher education. As a not-for-profit Agency, all revenue beyond paying the bills are given back to these deserving students.

The IT Security Architect leads the Network, Systems and/or Applications security in accordance with the PHEAA’s strategic goals. IT Security Architect is responsible for defining, developing, and designing security systems in order to solve business and technology problems. Analyze current security technology platforms in order to suggest enhancements, strengthen security, and serve as an information security subject matter expert in one or more security domains. This individual applies proven communication skills, problem-solving skills, and knowledge of security best practices to guide team members on issues related to overall enterprise security.

Job Responsibilities

Strategy Development

  • Change agent within the organization through hands on technical and security subject matter expertise.
  • Analyze project-level security architecture needs; recommend solutions to align with security architecture.
  • Design security patterns for efficient and highly secure infrastructure across the blended cloud and on premise architectural footprint.
  • Perform technology research and analysis, facilitate systems and services acquisition, architecture and risk assessment across the blended cloud and on premise architecture.
  • Contribute to Identity and Access Management, Application Security, Systems Security and/or Network Security including use of cloud-based and emerging technologies.
  • Guide the solution design, engineering and deployment of PHEAA’s IT solutions across the blended cloud and on premise architectural footprint.
  • Ensure compliance to security industry standards including NIST, PCI, FISMA, and FedRAMP specific requirements or policies.
  • Provide architectural support and strategic guidance for the security technologies.
  • Identify and implement security controls to cost-effectively protect information system assets.
  • Perform security reviews, review vulnerability scans and penetration tests, and assist the peer Digital Technology Solutions (DTS) teams with security best practices in their respective areas.
  • Maintain knowledge of current security industry best practices and technologies.

Project Coordination

  • Collaborate with and influence project teams on security policy and procedures regarding use of security products, techniques and patterns.
  • Lead the implementation of moderate to high complexity security initiatives.
  • Must be capable of Identifying and resolving issues and conflicts.
  • Identify deviations from security policy and report on risks and exposures needing remediation.
  • Provide on-going guidance, mentoring, and motivation to ESO staff.
  • Other Duties as assigned.


Required Skills

  • Minimum qualifications: Bachelor's degree Computer Science/Information Security/Risk Analysis and a minimum of 7+ years of relevant industry experience required or any equivalent combination of knowledge, training, and/or experience.
  • Advance knowledge of standards, security controls, information technology and information security.
  • Experience with hacker techniques, phishing schemes, emerging logical security threats, and compromised server techniques.
  • Demonstrated ability to enterprise-wide issues and recommends solutions for the detection, remediation and prevention of security vulnerabilities.
  • Proven experience working with compliance, legal and privacy with respect to logical security, personally identifiable information, data protection etc.
  • Expert knowledge of one or more of secure systems and network architectures and best practices, identity and access management, application security, encryption technologies, CISCO (switches, routers), firewalls, IDS/IPS, and database.
  • Proficient in a wide range of security technologies and passionate about protecting the environment, employees and company assets in all forms.
  • Viewed as an expert in security technologies with knowledge of related technology areas.
  • Demonstrated ability to apply security architectural principles, methods and tools to solve business problems.
  • Demonstrated expertise in architecting and designing highly available, scalable, and secure solutions that use, virtualization, DR/Business continuity, and security technologies and concepts.
  • Ability to excel with minimal direct supervision.
  • If selected for a position, following a conditional job offer, all candidates for employment must be able to pass a criminal background check, which is not an automatic bar to employment; a student loan check, where all loans must be in good standing; and provide proof of education. Candidates for this position would need to obtain the Public Trust security clearance. For this level of clearance, the federal government has a requirement that all applicants must possess a U.S. citizenship. In light of this federal government requirement, PHEAA will be unable to hire applicants without United States citizenship for such positions.

Preferred Qualifications: Current security-related industry certifications (CISSP, CRISC, and/or CISA); application and network architecture frameworks and experience; information security risk management; knowledge of cloud computing and cloud native technologies; experience with cloud security, identity and compliance products (AWS, Azure);



Required Experience


  • Minimum qualifications: Bachelor's degree Computer Science/Information Security/Risk Analysis and a minimum of 7+ years of relevant industry experience required or any equivalent combination of knowledge, training, and/or experience.
  • Advance knowledge of standards, security controls, information technology and information security.
  • Experience with hacker techniques, phishing schemes, emerging logical security threats, and compromised server techniques.
  • Demonstrated ability to enterprise-wide issues and recommends solutions for the detection, remediation and prevention of security vulnerabilities.
  • Proven experience working with compliance, legal and privacy with respect to logical security, personally identifiable information, data protection etc.
  • Expert knowledge of one or more of secure systems and network architectures and best practices, identity and access management, application security, encryption technologies, CISCO (switches, routers), firewalls, IDS/IPS, and database.
  • Proficient in a wide range of security technologies and passionate about protecting the environment, employees and company assets in all forms.
  • Viewed as an expert in security technologies with knowledge of related technology areas.
  • Demonstrated ability to apply security architectural principles, methods and tools to solve business problems.
  • Demonstrated expertise in architecting and designing highly available, scalable, and secure solutions that use, virtualization, DR/Business continuity, and security technologies and concepts.
  • Ability to excel with minimal direct supervision.
  • If selected for a position, following a conditional job offer, all candidates for employment must be able to pass a criminal background check, which is not an automatic bar to employment; a student loan check, where all loans must be in good standing; and provide proof of education. Candidates for this position would need to obtain the Public Trust security clearance. For this level of clearance, the federal government has a requirement that all applicants must possess a U.S. citizenship. In light of this federal government requirement, PHEAA will be unable to hire applicants without United States citizenship for such positions.

Preferred Qualifications: Current security-related industry certifications (CISSP, CRISC, and/or CISA); application and network architecture frameworks and experience; information security risk management; knowledge of cloud computing and cloud native technologies; experience with cloud security, identity and compliance products (AWS, Azure);

*