Enterprise I.T Security Architect

Job Title: Enterprise I.T Security Architect
Contract Type: Contract
Location: Jacksonville, Florida
Salary: US$70 - US$100 per hour
Job list.duration: 6 Months
REF: ITSECJACK2019_1569600381
Contact Name: Joe Southgate
Contact Email:
Job Published: 8 months ago

Job Description

Enterprise I.T Security Architect - Jacksonville - 6 Month Contract (to hire)

    • Work with minimal supervision to develop architecture solutions, standards, best practices and the governance process that enables the enterprise to develop and implement security solutions and capabilities that are aligned with business and technology strategies. This includes designing security architecture for application development projects, infrastructure solutions projects, as well as evaluating and recommending security software and solutions.
    • Develop, publish and present appropriate security architecture principles and standards, position papers, best practices, patterns and frameworks.
    • Determine baseline security configuration standards for networks, operating systems, web and application stacks.
    • Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
    • Partner with Infrastructure, Architecture and IT Operations teams to drive secure-by-design standards and practices, including baseline security configuration standards for networks, operating systems, web and application stacks.
    • Collaborate with Information Security Management to document identified issues and risks, and appropriate remediation plans.


  • Bachelor's Degree in Information Technology, Information Security, Information Assurance, Information Management or equivalent related work experience
  • 7+ years of experience in cyber security, information security, information technology, systems architecture, systems engineering
  • Must have participated in developing the security technology architecture for multiple projects using industry standard methodologies such as SABSA, Zachman and/or TOGAF
  • Direct, hands-on experience or strong working knowledge of managing security infrastructure - e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
  • Experience reviewing application code for security vulnerabilities preferred
  • Direct, hands-on experience or a strong working knowledge of vulnerability management tools
  • Experience with and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.
  • Strong working knowledge of IT infrastructure, applications, databases, operating systems, hypervisors, IP networks, storage networks, backup networks and media
  • Strong working knowledge of cloud infrastructure and security best practices, such as Amazon Web Services, Microsoft Azure, etc.
  • Strong working knowledge of IAM technologies and services such as Active Directory, Lightweight Directory Access Protocol (LDAP) and Amazon Web Service (AWS) IAM
  • Strong working knowledge of IT service management (e.g., ITIL-related disciplines) such as Change management, Configuration management, Asset management, Incident management, Problem management
  • Experience designing the deployment of applications and infrastructure into public cloud services.
  • Certification in one or more security disciplines: Certified Information Systems Security Professional (CISSP), CISSP-Information Systems Security Architecture Professional (ISSAP), Certified Cloud Security Professional (CCSP)


  • Strong team skills and ability to listen, build consensus, and collaborate with business, IT and security groups
  • Strong and effective interpersonal skills with the ability to relate to all levels of management
  • Excellent written and verbal communication, organizational, problem solving, and decision-making skills
  • Strong analytical and quantitative skills
  • Must be an innovative and logical thinker
  • Ability to deal with and meet tight deadlines with limited resources
  • Ability to work and achieve goals without supervision
  • Exhibit confidence and a proper level of assertiveness when needed; displays maturity in approach and ability to effectively handle stress and frustration
  • Ability to exercise good judgment in evaluating situations and business operating procedures and controls
  • Ability to thrive in an environment of change and manage multiple tasks and responsibilities simultaneously
  • Possess a strong knowledge and understanding of various information security areas, such as: Identity and Access Management, Threat and Vulnerability Management, Information Risk and Governance, Information Technology Architecture, Incident Response and Information Technology Monitoring and Controls
  • Strong knowledge in identifying and assessing Information Security risk and development of appropriate approaches to mitigate risk
  • Good knowledge and understanding of Information Security regulatory requirements and security awareness
  • Possess a strong knowledge and understanding of standards and frameworks such as Control Objectives for Information and Related Technology (COBIT5), International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST) and Information Technology Infrastructure Library (ITIL) and other industry related information security/assurance frameworks
  • Familiar with a variety of the field's concepts, practices, and procedures
  • Strong knowledge and understanding of Information Security risk and controls
  • Strong ability to write security reports, effectively communicates security metrics concepts into business language, and present to audiences of varied technical skill levels