Experienced Security Architect consultant to support expanding IAM and security automation initiatives. Design, implement, and automate enterprise security solutions.
Key Highlights
Technical Skills Required
Benefits & Perks
Job Description
Job Title : Security Architect – Consultant (IAM & Security Automation)
Work Type: Contract (W2 or 1099)
Location: 100% Remote (U.S. Nationwide)
Job Overview:
We are seeking an experienced Security Architect – Consultant to support expanding Identity and Access Management (IAM) and security automation initiatives.
This is a hands-on architecture and engineering role focused on designing, implementing, and automating enterprise security solutions that protect systems and data.
Key Responsibilities:
- Design, implement, and support IAM solutions
- Identity lifecycle management
- Single Sign-On (SSO)
- Multi-Factor Authentication (MFA)
- Active Directory and application integrations
- Develop and maintain automation workflows using scripting and integration tools
- Plan, design, and implement enterprise security architectures aligned with business objectives and risk tolerance
- Design and deploy security countermeasures for known and emerging threats
- Ensure consistent implementation and measurement of security controls across enterprise systems
- Support large-scale security initiatives and safeguard data and technology services
- Operate fully remotely while collaborating with distributed teams
Required Skills:
- 5+ years of automation development (Python, Bash, or similar tools)
- 5+ years of expert-level experience in Identity and Access Management (IAM)
- 5+ years of experience in cybersecurity principles, concepts, and best practices
- 5+ years of experience supporting Linux and Windows environments
- Minimum 5 years supporting large-scale or enterprise IT environments
Preferred Skills:
- SIEM analysis and reporting
- NIST
- NIST Cybersecurity Framework (CSF)
- CJIS
- CMS MARS-E
- Application Security (AppSec) experience
Education & Certifications:
Required:
- Bachelor’s degree in Information Technology, Information Security, or related field
Preferred:
- CISSP, CISA, CISO, or equivalent advanced security certification
- CEH, OSCP, GPEN, or similar certifications
- Vendor certifications related to SIEM or logging technologies