Location: WA, DC 20002
Term: 12 months
Day-to-Day Responsibilities:
Develop and implement Zero Trust Architecture:
-
Design and architect a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.
-
Define security policies, access controls, and authentication mechanisms based on Zero Trust principles.
-
Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.
-
Collaborate with cross-functional teams to understand business requirements and translate them into security architecture designs.
-
Develop security roadmaps and strategic plans that align with business goals and industry best practices.
-
Conduct regular risk assessments to identify potential security vulnerabilities and gaps in the existing architecture.
-
Develop and implement strategies to mitigate identified risks and ensure the confidentiality, integrity, and availability of critical systems and data.
-
Provide guidance on security incident response and recovery plans.
-
Evaluate and recommend security tools, technologies, and solutions that support Zero Trust principles and align with organizational requirements.
-
Collaborate with vendors and third-party providers to implement security solutions effectively.
-
Develop and maintain technical documentation, including architectural diagrams, standards, and guidelines.
-
Foster a security-aware culture by promoting best practices, providing training sessions, and creating awareness campaigns related to Zero Trust Architecture.
-
Educate stakeholders on security risks, threats, and mitigation strategies.
Is this a good fit? (Requirements):
-
Bachelor's or master’s degree in computer science, Information Systems, or a related field.
-
Extensive experience as a Security Architect, with a focus on designing and implementing Zero Trust Architecture.
-
In-depth knowledge of Zero Trust principles, frameworks, and best practices, such as the Forrester Zero Trust Extended (ZTX) model.
-
Strong understanding of network architecture, protocols, and security technologies.
-
Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.
-
Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.
-
Experience with security assessment and penetration testing methodologies.
-
Excellent problem-solving and analytical skills.
-
Strong communication and interpersonal skills to collaborate effectively with technical and non-technical stakeholders.
-
Relevant certifications, such as CISSP, CISM, or CCSP.