IT Network Security Systems Architect

Company Name:
Request Technology-Robyn Honquest
IT Network Security Systems Architect Must have a Bachelor's Degree. Looking for a Security Specialist that does security design. You will need 7 years IT Security Specialist, architecture and engineering. Will be over network security, Firewall, DLP, IDS/IPS, authentication, encryption. Not just a Firewall person. The more diversity, the better. Must have strong design, implementation and support of IT security tools and policies. Will act as technical lead over 3-5 others in IT Security. Would prefer CISSP or other security certifications. Need excellent soft skills and job stability. Responsibilities: Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies Up to 10% travel required Basic Qualifications: A Bachelor's degree 7 years of applied experience with demonstrated skills in IT Security Location Negotiable: Roswell, GA - Neenah, WI - Knoxville,TN MYK62683JR

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

IT Enterprise Security Architect
Milwaukee, WI Apex Systems
Information Systems Architect MMIS
Madison, WI DXC Technology
Salesforce System Architect
Milwaukee, WI Kforce
Information Systems Architect Healthcare
Madison, WI DXC Technology