MCS - Cloud Security Architect
Cloud Security Architect reporting into the DTMB's Michigan Cyber Security department with dotted line reporting relationship to DTMB's Enterprise Architecture department. Responsible for the security architecture for Cloud, IaaS, tenant platforms.Years of Experience:7+ years of experience in security architecture10+ years of experience in information security (engineering, analyst, incident response)10+ years of experience working with computer systems10+ years of experience working with network software and hardware, data or voice as well as experience with open and proprietary software and hardwareJob Description:• \tEstablish the target security/infrastructure architecture for security platforms.• \tActs as consultant and subject matter expert to leadership and project sponsor in defining the vision, objective and scope of major security related work projects and programs.• \tConsults with project delivery teams and solution providers to implement security architecture frameworks and solutions.• \tConsults and researches with vendor product specialists/sales, independent research organizations, on-site support engineers and fellow architects and administrators on best-fit technologies and also ensure compliance to department policies & standards and technology roadmap.• \tCoordinate with Enterprise Architecture team for technology validation or suggestions for alternative solutions. If necessary, initiate Solution Assessments, Infrastructure Service Requests, and any applicable required documentation to implement the new technology.• \tAdvocates the use of emerging cyber security best practices, technologies, developing standards and procedures, promoting the usage of automated tools, developing strategies, and aligning practices with strategic initiatives.• \tAuthors requirements, including definition of dependencies on infrastructure consolidation efforts.• \tAuthors design related artifacts (Functional Design, System Design, Security Architecture)• \tProduce architectural framework documents i.e., white papers, guidance documents, best practices, technical reports, etc.• \tPerforms security architecture and general security reviews for new infrastructure and system implementations• \tDefine Security/Information Assurance requirements (and dependencies).• \tSpecify key architectural aspects of the architecture view and identify other aspects that need definition.• \tProject contributor representing security and participates in project plan development• \tProvides project estimates based on past experience with security implementation-based projects and programs• \tLeverage broad-based understanding of technology areas and end-to-end knowledge of current installations to craft architectural solutions or standards that can be applied across the enterprise.• \tOperate within the context of the State of Michigan - State Unified IT Environment (SUITE) process methodology.• \tProvide strategic and architectural support for cyber Security as a Subject Matter Expert.• \tProvide support and subject matter expertise with respect to adherence to security controls (e.g. NIST 800, CIS, and related)• \tProvide support and subject matter expertise with respect to adherence to Enterprise Architecture Frameworks (e.g. TOGAF or related)Required/Desired SkillsSkillRequired /DesiredAmountof ExperienceExperience in large, complex information technology environmentsRequired10YearsDemonstrates practical experience in cloud security (Azure, AWS or related)Required5YearsPractical experience consulting with project teams and solution providersRequired8YearsDemonstrates practical experience and in-depth knowledge of security controls (e.g. NIST and CIS Top 20 and related)Required5YearsDemonstrates practical experience and in-depth knowledge of security frameworks (e.g. ISO27001Required5YearsDemonstrates practical experience and in-depth knowledge of regulatory security controls (e.g. PCI, HIPAA, CJIS, FISMA)Desired5YearsDemonstrates practical experience in Enterprise Architecture Frameworks such as TOGAF or relatedRequired5YearsDemonstrates practical experience in networkingRequired5YearsDemonstrates practical experience in application security Required5YearsDemonstrates practical experience in Identity and access management (IAM)Required5YearsExperience working with current and emerging information security technologiesHighly desired5YearsExperience working with current and emerging development methodologiesDesired4YearsBachelors Degree in Computer Science, Information Systems or EngineeringRequired4YearsQuestions