Security Architect Consultant

InterSources Inc United State
Remote
Apply
AI Summary

Experienced Security Architect Consultant sought to support Identity and Access Management (IAM) services and security automation initiatives. Design, implement, and operationalize secure enterprise solutions while developing automation integrations across security and IT platforms.

Key Highlights
Design, implement, and support Identity and Access Management (IAM) solutions
Develop and implement automation solutions integrating disparate security and enterprise IT tools
Plan, design, and implement enterprise security architectures aligned with business objectives and risk tolerance
Technical Skills Required
Python Bash Linux Windows Network security protocols and procedures Identity and access control Logging and reporting systems SIEM analysis and reporting Security frameworks and compliance standards (NIST, NIST Cybersecurity Framework, CJIS, IRS 1075, CMS MARS-E)
Benefits & Perks
100% Remote Work
Nationwide (No South Carolina residency required)

Job Description


Position Title: Security Architect – Consultant (9309)

Work Location: Columbia, SC 100% Remote (Telework)

Candidate Location: Nationwide (No South Carolina residency required)

Contract Duration: 12 Months

Interview Process: 1–2 rounds, virtual (Microsoft Teams – camera required)


Position Overview

The Client is seeking an experienced Security Architect – Consultant to support Identity and Access Management (IAM) services and security automation initiatives. This is a fully remote role focused on designing, implementing, and operationalizing secure enterprise solutions while developing automation integrations across security and IT platforms.


Scope of Work

The consultant will function as a Security Architect with a strong focus on IAM and security automation. The role involves strategic security architecture design, solution planning, and hands-on implementation to enhance the Client`s security posture across enterprise systems.


Key Responsibilities

  • Design, implement, and support Identity and Access Management (IAM) solutions, including:
  • Identity lifecycle management
  • Single Sign-On (SSO)
  • Multi-Factor Authentication (MFA)
  • Active Directory and application integrations
  • Develop and implement automation solutions integrating disparate security and enterprise IT tools using scripting and automation frameworks
  • Plan, design, and implement enterprise security architectures aligned with business objectives and risk tolerance
  • Design, deploy, and manage countermeasures to known security threats
  • Develop preventative and mitigation strategies for emerging security risks
  • Ensure consistent application of security controls across enterprise infrastructure and applications
  • Validate, measure, and improve protective security measures to safeguard state data and technology services
  • Support large-scale IT environments and system deployments from a security architecture perspective


Required Skills & Experience

  • 5+ years of expert-level experience in automation development using Python and Bash
  • 5+ years of experience with identity and access control, logging, and reporting systems
  • 5+ years of experience with Linux, Windows, and network security protocols and procedures
  • 5+ years of experience supporting large IT environments and/or enterprise system deployments
  • 5+ years of experience demonstrating strong cybersecurity awareness and security best practices
  • Bachelor’s degree in Information Technology, Information Security, or a related field
  • OR 8+ years of relevant security architecture experience in lieu of a degree


Preferred Skills & Experience

  • Hands-on experience with SIEM analysis and reporting
  • Strong knowledge of security frameworks and compliance standards, including:
  • NIST
  • NIST Cybersecurity Framework (CSF)
  • CJIS
  • IRS 1075
  • CMS MARS-E
  • Experience with Application Security (AppSec) principles and practices


Preferred Certifications

  • CISSP, CISA, CISO, or equivalent advanced security certification
  • Additional security certifications such as CEH, OSCP, GPEN
  • Vendor certifications in SIEM or logging technologies


Subscribe our newsletter

New Things Will Always Update Regularly