Job Description The Role is responsible for ensuring the optimal performance, security, and reliability of the Global Electronic Security Systems (ESS) consisting of but not limited to: Electronic Access Control, Visitor Management, Electronic Key Control, Physical Identity & Access Management, Intrusion Detection, Security Video, Security Audio, and the respective Monitoring and Control operations for those systems. The primary activities performed by the role include troubleshooting complex software and hardware issues, support applications, maintain databases, and in general overseeing Security Assessments and Application Technical Contact (ATC) responsibilities for all Global Security & Safety (GSS) systems. The role will also collaborate with other Physical Security Technology (PST) team members, as well as other teams and stakeholders throughout Visa to deliver high-quality, highly available solutions that meet the business needs and requirements. Essential Functions: Act on ATC responsibilities and tasks to maintain compliance with ShiftLeft and audit requirements (including but not limited to user validation and transfer report reviews, exception requests and closeout, keeping documentation of product changes when they arise, and risk remediation when identified) ATC of all GSS ESS platforms, including Cyber Security Assessment (ShiftLeft) processes, i.e. manages ShiftLeft process covering software and hardware architecture review, risk remediation, and support of development to production environments as part of the ATC responsibilities for GSS technology, software, and hardware. Interprets cyber security test results and provides recommendations and guidance for the remediation of findings by assisting manufacturers, vendors with software code, script, and technology changes that meet desired outcomes and reduce risk profiles. Provide timely and effective solutions for critical incidents that affect the ESS and its subsystems and integrations, such as patch failures, driver errors, or system outages. Diagnose and resolve complex problems that require in-depth analysis and investigation. Troubleshoot complex network issues related to connecting ESS hardware to primary and secondary ethernet infrastructure including routing, tunnels, bridges, proxies, NATs, and other networking skills, and perform root cause analysis, and provide solutions for network and system problems. Configures servers, services, and selected data feeds such as SSH, SFTP, HTTP, SMB, Certs, etc. Generates metrics and KPIs for overall function and publishing via GSS and Corporate Services dashboards. Handle requests for new features, enhancements, and bug fixes for the existing applications and tools. Designs and implements solutions that meet the business needs and requirements, while ensuring the security and integrity of the data and the systems. Maintenance of production environment through monitoring and maintenance of the ESS, ensuring their availability, performance, and security, perform regular backups, updates, patches, and audits of the security systems. Develop and maintain applications and tools for internal and external use, using C# (and other 'C' variations), PowerShell, Bash, or other languages as required. Supporting existing applications and codebases that were developed by previous engineers and highlight areas to replace them with more effective manufacturer supplied or Visa supplied tools. Provide evidence and data for internal and external audits and ensuring accuracy and quality of the information. Ensure that GSS technology and architecture represent industry best practices. Maintain understanding of innovation and developments in the industry, and proactively assess future technologies and solutions via strategic initiatives. Ensure resiliency of systems, vendors, stakeholders, and team Work as directed by Manager. This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.
03/29/2024
Full time
Job Description The Role is responsible for ensuring the optimal performance, security, and reliability of the Global Electronic Security Systems (ESS) consisting of but not limited to: Electronic Access Control, Visitor Management, Electronic Key Control, Physical Identity & Access Management, Intrusion Detection, Security Video, Security Audio, and the respective Monitoring and Control operations for those systems. The primary activities performed by the role include troubleshooting complex software and hardware issues, support applications, maintain databases, and in general overseeing Security Assessments and Application Technical Contact (ATC) responsibilities for all Global Security & Safety (GSS) systems. The role will also collaborate with other Physical Security Technology (PST) team members, as well as other teams and stakeholders throughout Visa to deliver high-quality, highly available solutions that meet the business needs and requirements. Essential Functions: Act on ATC responsibilities and tasks to maintain compliance with ShiftLeft and audit requirements (including but not limited to user validation and transfer report reviews, exception requests and closeout, keeping documentation of product changes when they arise, and risk remediation when identified) ATC of all GSS ESS platforms, including Cyber Security Assessment (ShiftLeft) processes, i.e. manages ShiftLeft process covering software and hardware architecture review, risk remediation, and support of development to production environments as part of the ATC responsibilities for GSS technology, software, and hardware. Interprets cyber security test results and provides recommendations and guidance for the remediation of findings by assisting manufacturers, vendors with software code, script, and technology changes that meet desired outcomes and reduce risk profiles. Provide timely and effective solutions for critical incidents that affect the ESS and its subsystems and integrations, such as patch failures, driver errors, or system outages. Diagnose and resolve complex problems that require in-depth analysis and investigation. Troubleshoot complex network issues related to connecting ESS hardware to primary and secondary ethernet infrastructure including routing, tunnels, bridges, proxies, NATs, and other networking skills, and perform root cause analysis, and provide solutions for network and system problems. Configures servers, services, and selected data feeds such as SSH, SFTP, HTTP, SMB, Certs, etc. Generates metrics and KPIs for overall function and publishing via GSS and Corporate Services dashboards. Handle requests for new features, enhancements, and bug fixes for the existing applications and tools. Designs and implements solutions that meet the business needs and requirements, while ensuring the security and integrity of the data and the systems. Maintenance of production environment through monitoring and maintenance of the ESS, ensuring their availability, performance, and security, perform regular backups, updates, patches, and audits of the security systems. Develop and maintain applications and tools for internal and external use, using C# (and other 'C' variations), PowerShell, Bash, or other languages as required. Supporting existing applications and codebases that were developed by previous engineers and highlight areas to replace them with more effective manufacturer supplied or Visa supplied tools. Provide evidence and data for internal and external audits and ensuring accuracy and quality of the information. Ensure that GSS technology and architecture represent industry best practices. Maintain understanding of innovation and developments in the industry, and proactively assess future technologies and solutions via strategic initiatives. Ensure resiliency of systems, vendors, stakeholders, and team Work as directed by Manager. This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.
*Permanent Remote role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior Cyber IAM Architecture Risk Manager. Candidate will be responsible for the planning, development and implementation of enterprise information security solutions (such as IAM, Clous, IAM, authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
11/07/2021
Full time
*Permanent Remote role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior Cyber IAM Architecture Risk Manager. Candidate will be responsible for the planning, development and implementation of enterprise information security solutions (such as IAM, Clous, IAM, authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
NO SPONSORSHIP Cloud Cyber Risk Architect must be a Microsoft Azure Cloud Infrastructure Architect out of a large enterprise environment Senior Cyber Risk Management Architect The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. QUALIFICATIONS A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
11/07/2021
Full time
NO SPONSORSHIP Cloud Cyber Risk Architect must be a Microsoft Azure Cloud Infrastructure Architect out of a large enterprise environment Senior Cyber Risk Management Architect The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. QUALIFICATIONS A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
*We are unable to sponsor as this is a permanent full time role* A prestigious company is on the search for an Authentication Consumer Architect. This role is revolved around identity access management. They need someone who can do a migration from Siteminder to Okta. They need experience with Azure Cloud Web Access Governance. They will be the SME on the migration. They need to be able to protect and enable access management for 35 million customer users. Responsibilities: Envision, define, design, build, and deliver to customers and stakeholders services to plan and develop reusable technical security platforms, develop and sustain secure IT solutions, instill threat resilience and appropriate use behaviors in IT solution users, develop survivable/highly-available IT solutions, plan for technology and facility survivability/continuity risk events. Mentors a team of senior security architects to develop/maintain future state vision for reusable technical security and appropriate use enforcement platforms, create a risk-based investment roadmap, align the vision and roadmap with business desire to take advantage of emerging technologies, develop business cases for specific investment projects, collaborate closely with the enterprise IT architecture area in designing enterprise security architecture, design, build, and implement the platforms, and transitioning them to operations. Develops and continuously evolves the organizations processes/methodologies, structure, culture, skills/experience, process support tools, knowledge resources, and other components. Establishes and maintains strong working relationships with industry peers and other external stakeholders including federal/local law enforcement agencies, industry organizations/consortia. Actively engages in driving strategic initiatives, and the related goals, to ensure the most optimal outcome. Consults with IT Services, aligns infrastructure and operations plans to the defined future state, and identifies opportunities to modify/mature the architecture to accommodate changes Communicate the status and accomplishments of the organizations technical security activities and projects to companys executive leaders, peers in the IT organization, customers and stakeholders. Partnering closely with the Compliance and Audit teams ensure adherence to all applicable legal, regulatory and contractual requirements in all activities of the organization. Instill and promote a strong results-oriented culture centered on business value creation, collaboration, commitment, merit-based recognition, personal development and external benchmarking. Qualifications: Bachelors degree or equivalent education and/or experience A minimum of 10 years related work experience Complete architecture-level understanding across Identity and Access Management (IAM) domains, for consumer and workforce personas, including enrollment and registration, identity profile and preference management, privacy enablement, runtime authentication, authorization, and access control, and credential management Expert level experience building complex distributed systems architecture based on industry standards such as OAuth, OpenID Connect, WebAuthN, SAML Advanced understanding and experience in at least one modern programming language such as Java (preferred), C++, C#, or Python, and mastery of object-oriented design and programming Experience with Cloud computing platforms (Microsoft Azure preferred) Expert in executing enterprise architecture and software development life cycle methodologies Ability to communicate and negotiate at leadership level on the target enterprise architecture and roadmap Interpersonal and leadership skills that demonstrate collaboration, facilitation, negotiation, conflict management and influence Experience in managing several (2 to 4) concurrent large-scale enterprise wide information technology capability development projects. Deep understanding of and prior hands-on experience in all major information security, appropriate use, and survivable system engineering functions and activities including policy setting, vulnerability/risk research, security/availability architecture, system security/survivability engineering, incident response, cyber risk operations, cyber risk audit/compliance. Complete architecture-level understanding of all major information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others.
11/06/2021
Full time
*We are unable to sponsor as this is a permanent full time role* A prestigious company is on the search for an Authentication Consumer Architect. This role is revolved around identity access management. They need someone who can do a migration from Siteminder to Okta. They need experience with Azure Cloud Web Access Governance. They will be the SME on the migration. They need to be able to protect and enable access management for 35 million customer users. Responsibilities: Envision, define, design, build, and deliver to customers and stakeholders services to plan and develop reusable technical security platforms, develop and sustain secure IT solutions, instill threat resilience and appropriate use behaviors in IT solution users, develop survivable/highly-available IT solutions, plan for technology and facility survivability/continuity risk events. Mentors a team of senior security architects to develop/maintain future state vision for reusable technical security and appropriate use enforcement platforms, create a risk-based investment roadmap, align the vision and roadmap with business desire to take advantage of emerging technologies, develop business cases for specific investment projects, collaborate closely with the enterprise IT architecture area in designing enterprise security architecture, design, build, and implement the platforms, and transitioning them to operations. Develops and continuously evolves the organizations processes/methodologies, structure, culture, skills/experience, process support tools, knowledge resources, and other components. Establishes and maintains strong working relationships with industry peers and other external stakeholders including federal/local law enforcement agencies, industry organizations/consortia. Actively engages in driving strategic initiatives, and the related goals, to ensure the most optimal outcome. Consults with IT Services, aligns infrastructure and operations plans to the defined future state, and identifies opportunities to modify/mature the architecture to accommodate changes Communicate the status and accomplishments of the organizations technical security activities and projects to companys executive leaders, peers in the IT organization, customers and stakeholders. Partnering closely with the Compliance and Audit teams ensure adherence to all applicable legal, regulatory and contractual requirements in all activities of the organization. Instill and promote a strong results-oriented culture centered on business value creation, collaboration, commitment, merit-based recognition, personal development and external benchmarking. Qualifications: Bachelors degree or equivalent education and/or experience A minimum of 10 years related work experience Complete architecture-level understanding across Identity and Access Management (IAM) domains, for consumer and workforce personas, including enrollment and registration, identity profile and preference management, privacy enablement, runtime authentication, authorization, and access control, and credential management Expert level experience building complex distributed systems architecture based on industry standards such as OAuth, OpenID Connect, WebAuthN, SAML Advanced understanding and experience in at least one modern programming language such as Java (preferred), C++, C#, or Python, and mastery of object-oriented design and programming Experience with Cloud computing platforms (Microsoft Azure preferred) Expert in executing enterprise architecture and software development life cycle methodologies Ability to communicate and negotiate at leadership level on the target enterprise architecture and roadmap Interpersonal and leadership skills that demonstrate collaboration, facilitation, negotiation, conflict management and influence Experience in managing several (2 to 4) concurrent large-scale enterprise wide information technology capability development projects. Deep understanding of and prior hands-on experience in all major information security, appropriate use, and survivable system engineering functions and activities including policy setting, vulnerability/risk research, security/availability architecture, system security/survivability engineering, incident response, cyber risk operations, cyber risk audit/compliance. Complete architecture-level understanding of all major information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others.
NO SPONSORSHIP Cloud Cyber Risk Architect must be a Microsoft Azure Cloud Infrastructure Architect out of a large enterprise environment Senior Cyber Risk Management Architect The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. QUALIFICATIONS A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
09/21/2021
Full time
NO SPONSORSHIP Cloud Cyber Risk Architect must be a Microsoft Azure Cloud Infrastructure Architect out of a large enterprise environment Senior Cyber Risk Management Architect The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. QUALIFICATIONS A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
*Permanent Remote role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior Cyber IAM Architecture Risk Manager. Candidate will be responsible for the planning, development and implementation of enterprise information security solutions (such as IAM, Clous, IAM, authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
09/21/2021
Full time
*Permanent Remote role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior Cyber IAM Architecture Risk Manager. Candidate will be responsible for the planning, development and implementation of enterprise information security solutions (such as IAM, Clous, IAM, authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
A prestigious company is on the search for a Sr. Cyber Risk Management Architect. This role will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This person needs to have experience with API application security, advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application. Also needed is experience with one or more of the programming languages such as C, C++ Java Python. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience
09/11/2021
Full time
A prestigious company is on the search for a Sr. Cyber Risk Management Architect. This role will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This person needs to have experience with API application security, advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application. Also needed is experience with one or more of the programming languages such as C, C++ Java Python. Responsibilities: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. This list is not all-inclusive and you are expected to perform other duties as requested or assigned. Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience
Job Req #: 21-07652 Job Description : Sales Engineer Location: This person needs to sit in Southern CA Job Type: FTE/Direct Hire Our client is one of the premier experts in the deployment and delivery of cybersecurity, cloud, automation, end-user computing, software-defined infrastructure, core infrastructure, and Microsoft solutions. They are known for being a trusted advisor to some of the most prominent companies in California within the healthcare, financial services, legal services sectors, as well as educational institutions and government agencies. When joining their organization, you will become part of team that is dedicated to the long-term success of both their employees and clients. Key Responsibilities: The cybersecurity sales engineer is responsible for cybersecurity sales and support for a division at my client. The security sales engineer will work with accounts teams in a pre-sales capacity to help position solutions, consulting, and services with our customers. The sales engineer also needs to articulate and demonstrate a broad understanding of multiple security disciplines like cloud security, identity management, attack surface management, and risk management. The preferred candidate will have a strong foundation with a passion to learn new technologies or explore emerging technologies through the venture market. Work with account teams on pre-sales activities which include but are not limited to: Understanding the customer cybersecurity and business requirements Strategic solution selling Participation in conference calls, onsite visits, and video discussions Solution demonstrations and proof of concept leadership Business solution proposal creation Confirm proposed solutions meet client requirements and assist account team with technical qualification during the qualification process Conduct product analysis to assist in the sales cycle Maintain security certifications (CISSP, CCSP, CASP, C|CISO) Attend regular internal meetings onsite and remote Ability to support multiple account teams Perform other duties as assigned Qualifications: Bachelor's degree in business, computer science, computer engineering or related field Minimum 6 years working experience in sales engineering activities to large enterprise or healthcare customers Strong knowledge and understanding of the security industry. In-depth knowledge of multiple security solution areas (network security, SASE, CASB, SOAR, and UEBA) Proven track record of contributing to the sales cycle and running opportunities from start to finish Possess presentation ready knowledge and product expertise in key security technologies and solutions Possess good technical knowledge of security architecture, network infrastructure, UNIX, Windows, application security, cloud security, and identity management Experience in preparing business solution proposal and provide corporate presentation to senior management Possess familiarity with security software solutions like firewall, intrusion prevention, encryption, data leak prevention, and data protection Possess experience with channel enablement, product/ services evangelism, and experience with managing proof of concepts Good spoken and written communication skills Willing and able to travel up to 50% Diane Douglas Account Lead/Senior Technical Recruiter About Ascent: The Ascent Services Group (ASG) is a nationally recognized technology staffing and consulting firm whose fundamental business is providing staffing services to Small, Medium, and Large Enterprise clients in our core market verticals: Financial Services, Healthcare, Technology and Life Sciences. As consultants for ASG, you will have access to many of the top clients within the industries we serve. Our goal is to deliver innovative talent through proven best practices and effective resource optimization. Become one of ASG's candidates and experience the difference! - provided by Dice
09/11/2021
Full time
Job Req #: 21-07652 Job Description : Sales Engineer Location: This person needs to sit in Southern CA Job Type: FTE/Direct Hire Our client is one of the premier experts in the deployment and delivery of cybersecurity, cloud, automation, end-user computing, software-defined infrastructure, core infrastructure, and Microsoft solutions. They are known for being a trusted advisor to some of the most prominent companies in California within the healthcare, financial services, legal services sectors, as well as educational institutions and government agencies. When joining their organization, you will become part of team that is dedicated to the long-term success of both their employees and clients. Key Responsibilities: The cybersecurity sales engineer is responsible for cybersecurity sales and support for a division at my client. The security sales engineer will work with accounts teams in a pre-sales capacity to help position solutions, consulting, and services with our customers. The sales engineer also needs to articulate and demonstrate a broad understanding of multiple security disciplines like cloud security, identity management, attack surface management, and risk management. The preferred candidate will have a strong foundation with a passion to learn new technologies or explore emerging technologies through the venture market. Work with account teams on pre-sales activities which include but are not limited to: Understanding the customer cybersecurity and business requirements Strategic solution selling Participation in conference calls, onsite visits, and video discussions Solution demonstrations and proof of concept leadership Business solution proposal creation Confirm proposed solutions meet client requirements and assist account team with technical qualification during the qualification process Conduct product analysis to assist in the sales cycle Maintain security certifications (CISSP, CCSP, CASP, C|CISO) Attend regular internal meetings onsite and remote Ability to support multiple account teams Perform other duties as assigned Qualifications: Bachelor's degree in business, computer science, computer engineering or related field Minimum 6 years working experience in sales engineering activities to large enterprise or healthcare customers Strong knowledge and understanding of the security industry. In-depth knowledge of multiple security solution areas (network security, SASE, CASB, SOAR, and UEBA) Proven track record of contributing to the sales cycle and running opportunities from start to finish Possess presentation ready knowledge and product expertise in key security technologies and solutions Possess good technical knowledge of security architecture, network infrastructure, UNIX, Windows, application security, cloud security, and identity management Experience in preparing business solution proposal and provide corporate presentation to senior management Possess familiarity with security software solutions like firewall, intrusion prevention, encryption, data leak prevention, and data protection Possess experience with channel enablement, product/ services evangelism, and experience with managing proof of concepts Good spoken and written communication skills Willing and able to travel up to 50% Diane Douglas Account Lead/Senior Technical Recruiter About Ascent: The Ascent Services Group (ASG) is a nationally recognized technology staffing and consulting firm whose fundamental business is providing staffing services to Small, Medium, and Large Enterprise clients in our core market verticals: Financial Services, Healthcare, Technology and Life Sciences. As consultants for ASG, you will have access to many of the top clients within the industries we serve. Our goal is to deliver innovative talent through proven best practices and effective resource optimization. Become one of ASG's candidates and experience the difference! - provided by Dice
NO SPONSORSHIP Consumer Authentication Architect Salary: $180k to $200k to $250k plus 20% bonus *No East Coasters* Looking for someone who has done a SiteMinder to Okta migration - Azure Cloud Web Access Governance (35 million customers) The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Strong understanding of information security, risk and data privacy within the domain of digital commerce including relevant practical experience Demonstrate a broad awareness of security engineering concepts and practices across all phases of the software development life cycle Experience providing security architecture advice for web based network environments and secure communication, including mobile applications, web applications and web services Knowledge and technical security experience in cryptography, including several of the following encryption, hashing, key management, digital certificates, TLS Knowledge of virtualization platforms such as Amazon Web Services (AWS) EC2, VMware vCloud Director, VMware vSphere and Google AppEngine, OpenStack or Azure Experience of continuous delivery continuous integration processes and procedures including critical security considerations in automated workflows Technical experience with Java or similar enterprise programming language, especially related to secure coding best practices Experienced in mobile security architecture concepts, design and implementation for Android and IOS Demonstrated experience designing secure multi-domain Internet-facing applications Demonstrate technical competency in security engineering based on hands-on experience or relevant qualifications Working knowledge and technical security experience with UNIX, Linux, Solaris, or AIX Demonstrate the ability to articulate and communicate effectively to diverse audiences and properly translates security and risk management terminology into business terms, and recommends alternative solutions to these stakeholders. Strong verbal and written communication skills Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
09/10/2021
Full time
NO SPONSORSHIP Consumer Authentication Architect Salary: $180k to $200k to $250k plus 20% bonus *No East Coasters* Looking for someone who has done a SiteMinder to Okta migration - Azure Cloud Web Access Governance (35 million customers) The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Strong understanding of information security, risk and data privacy within the domain of digital commerce including relevant practical experience Demonstrate a broad awareness of security engineering concepts and practices across all phases of the software development life cycle Experience providing security architecture advice for web based network environments and secure communication, including mobile applications, web applications and web services Knowledge and technical security experience in cryptography, including several of the following encryption, hashing, key management, digital certificates, TLS Knowledge of virtualization platforms such as Amazon Web Services (AWS) EC2, VMware vCloud Director, VMware vSphere and Google AppEngine, OpenStack or Azure Experience of continuous delivery continuous integration processes and procedures including critical security considerations in automated workflows Technical experience with Java or similar enterprise programming language, especially related to secure coding best practices Experienced in mobile security architecture concepts, design and implementation for Android and IOS Demonstrated experience designing secure multi-domain Internet-facing applications Demonstrate technical competency in security engineering based on hands-on experience or relevant qualifications Working knowledge and technical security experience with UNIX, Linux, Solaris, or AIX Demonstrate the ability to articulate and communicate effectively to diverse audiences and properly translates security and risk management terminology into business terms, and recommends alternative solutions to these stakeholders. Strong verbal and written communication skills Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
NO SPONSORSHIP Consumer Authentication Architect Salary: $180k to $200k to $250k plus 20% bonus *No East Coasters* Looking for someone who has done a SiteMinder to Okta migration - Azure Cloud Web Access Governance (35 million customers) The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Strong understanding of information security, risk and data privacy within the domain of digital commerce including relevant practical experience Demonstrate a broad awareness of security engineering concepts and practices across all phases of the software development life cycle Experience providing security architecture advice for web based network environments and secure communication, including mobile applications, web applications and web services Knowledge and technical security experience in cryptography, including several of the following encryption, hashing, key management, digital certificates, TLS Knowledge of virtualization platforms such as Amazon Web Services (AWS) EC2, VMware vCloud Director, VMware vSphere and Google AppEngine, OpenStack or Azure Experience of continuous delivery continuous integration processes and procedures including critical security considerations in automated workflows Technical experience with Java or similar enterprise programming language, especially related to secure coding best practices Experienced in mobile security architecture concepts, design and implementation for Android and IOS Demonstrated experience designing secure multi-domain Internet-facing applications Demonstrate technical competency in security engineering based on hands-on experience or relevant qualifications Working knowledge and technical security experience with UNIX, Linux, Solaris, or AIX Demonstrate the ability to articulate and communicate effectively to diverse audiences and properly translates security and risk management terminology into business terms, and recommends alternative solutions to these stakeholders. Strong verbal and written communication skills Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
09/09/2021
Full time
NO SPONSORSHIP Consumer Authentication Architect Salary: $180k to $200k to $250k plus 20% bonus *No East Coasters* Looking for someone who has done a SiteMinder to Okta migration - Azure Cloud Web Access Governance (35 million customers) The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Strong understanding of information security, risk and data privacy within the domain of digital commerce including relevant practical experience Demonstrate a broad awareness of security engineering concepts and practices across all phases of the software development life cycle Experience providing security architecture advice for web based network environments and secure communication, including mobile applications, web applications and web services Knowledge and technical security experience in cryptography, including several of the following encryption, hashing, key management, digital certificates, TLS Knowledge of virtualization platforms such as Amazon Web Services (AWS) EC2, VMware vCloud Director, VMware vSphere and Google AppEngine, OpenStack or Azure Experience of continuous delivery continuous integration processes and procedures including critical security considerations in automated workflows Technical experience with Java or similar enterprise programming language, especially related to secure coding best practices Experienced in mobile security architecture concepts, design and implementation for Android and IOS Demonstrated experience designing secure multi-domain Internet-facing applications Demonstrate technical competency in security engineering based on hands-on experience or relevant qualifications Working knowledge and technical security experience with UNIX, Linux, Solaris, or AIX Demonstrate the ability to articulate and communicate effectively to diverse audiences and properly translates security and risk management terminology into business terms, and recommends alternative solutions to these stakeholders. Strong verbal and written communication skills Qualifications: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
NO SPONSORSHIP Senior Cyber Risk Management Architect Salary: $160k to $185k plus 20% bonus 100% Remote Looking for a true architect with at least 2 years minimum of architecture. You can be in the application or infrastructure space; infrastructure would be preferred with heavy cloud networking and operating systems etc. Will come up with solutions to mitigate risks not a GRC person Azure is a huge plus Enterprise security architecture. The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. QUALIFICATIONS: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
09/09/2021
Full time
NO SPONSORSHIP Senior Cyber Risk Management Architect Salary: $160k to $185k plus 20% bonus 100% Remote Looking for a true architect with at least 2 years minimum of architecture. You can be in the application or infrastructure space; infrastructure would be preferred with heavy cloud networking and operating systems etc. Will come up with solutions to mitigate risks not a GRC person Azure is a huge plus Enterprise security architecture. The Senior Cyber Risk Management Architect will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. QUALIFICATIONS: A working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others. Demonstrated understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors). Strong understanding of systems development life cycle. Knowledge of open security testing standards and projects, including OWASP. Proficiency in one or more of the following: C, C++, Java, Python, Powershell, JavaScript or NodeJS. Relevant security certifications (CISSP, OSCP, OSCE, GPEN, GXPN, CEH). Knowledge of laws, regulations, and standards relevant to the US Healthcare industry. Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
Chief Information Security Officer (CISO) Location: Elkridge, MD/Remote FosterThomas, a Mid-Atlantic Staffing and Recruiting Firm, is leading the search for a Chief Information Security Officer (CISO) for our Client located Elkridge, MD, currently remote. This Chief Information Security Officer (CISO) is a key leadership role responsible for the governance and oversight of the access, availability, and integrity of business data assets and intellectual property. The leader is responsible for ensuring the business is appropriately protected against risks associated with cyber-attacks on external and internal resources. The leader develops the enterprise information security strategy and is responsible for the security and privacy program. Communicates regularly with the President/CEO and executive staff and educate the workforce about threats, vulnerabilities, and risks. The CISO will oversee and coordinate security efforts across the company, including information technology, human resources, communications, facilities management and other groups, and will identify security initiatives and standards. Responsibilities: Develops and maintains the corporate security program(s); implements and maintains industry best practices with respect to security and security controls across the organization Manage the development and implementation of global security policy, standards, guidelines and procedures to ensure ongoing maintenance of security. Physical protection responsibilities will include asset protection, workplace violence prevention, access control systems, video surveillance, and more. Information protection responsibilities will include network and cloud security architecture, network access and monitoring policies, employee education and awareness, and more Lead the information security team to achieve the information security strategy; proactively influence peers and senior leaders in other business units to build a strong security culture Balance the risk between security controls in a strongly-regulated and complex IT environment against the needs for fast revenue growth in a highly competitive industry Understand the threats against the company - who they are, how they operate, what motivates them - and how to allocate the right level of resources to counter them Think creatively about simple, practical, cost-effective solutions for defending the company and customers against increasingly aggressive and sophisticated cyber attackers Prior experience in leading security incident response efforts Articulate complex information security concepts to senior executives and non-technical employees clearly while accurately portraying real risks and threats to the company Lead operational risk management activities to enhance the value of the company and brand Oversee a network of security practitioners and vendors who safeguard the company's assets, intellectual property and computer systems, as well as the physical safety of employees and visitors. Identify protection goals, objectives and metrics consistent with corporate objectives Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology Lead, develop, and oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary. Work with outside consultants as appropriate for independent security audits Demonstrated ability to work under pressure and maintain composure during high-stress situations Experience in establishing, operating, assessing, and maintaining a FISMA/NIST compliant architecture Advanced understanding of security architecture, security technologies, systems design, integration of systems and networking Leads and/or Participates in formal certification, test, and evaluation activities. Working experience in drafting, developing, and submitting Security Assessment and Authorization (SA&A) documentation, System Security Plans (SSP), Security Concept of Operations (CONOPs), Contingency Plans, Security Architectures, Risk Assessment Plan and Plan of Action and Milestones (POAM) Review and/or implement security programs in compliance with FedRAMP and HIPAA/HITECH. ISO 27001 and HITRUST experience strongly desired Establish and maintain a vulnerability management program for corporate and client environments Assist analysts with the review of SAST, DAST, and SCA scans as needed, and provide recommendations on remediation/mitigation approaches Assist analysts with the review and update of SIA, SSP, CP, ISRA, POA&M, and network security diagrams Qualifications: 10 years of information security experience including 5 years as an information security leader, with a demonstrated record of delivering business value BA or BS; MA or MS preferred CISSP required. CISM, C|CISO, CISSP-ISSMP, GSTRT or similar certification security management certification preferred Previous experience in a CISO role is preferred Experience with applicable regulatory and standards frameworks (e.g. FISMA, NIST CSF, FedRAMP, ISO2700x, HIPAA/HITECH, HITRUST etc.) Advanced understanding in one or more of the following areas: Platform Security, Data Security, Network Security, Cloud Security, Physical Security, Security Assessment Tools including SAST, DAST, and SCA, Security Monitoring Tools, and Managed Security Services Advanced understanding in one or more of the following areas: Security Governance Standards, Business Continuity Planning, Enterprise Risk Management, Computer Security Incident Response, and Security Compliance Audits Previous experience preparing updates and presenting to Senior Leadership - provided by Dice
01/31/2021
Full time
Chief Information Security Officer (CISO) Location: Elkridge, MD/Remote FosterThomas, a Mid-Atlantic Staffing and Recruiting Firm, is leading the search for a Chief Information Security Officer (CISO) for our Client located Elkridge, MD, currently remote. This Chief Information Security Officer (CISO) is a key leadership role responsible for the governance and oversight of the access, availability, and integrity of business data assets and intellectual property. The leader is responsible for ensuring the business is appropriately protected against risks associated with cyber-attacks on external and internal resources. The leader develops the enterprise information security strategy and is responsible for the security and privacy program. Communicates regularly with the President/CEO and executive staff and educate the workforce about threats, vulnerabilities, and risks. The CISO will oversee and coordinate security efforts across the company, including information technology, human resources, communications, facilities management and other groups, and will identify security initiatives and standards. Responsibilities: Develops and maintains the corporate security program(s); implements and maintains industry best practices with respect to security and security controls across the organization Manage the development and implementation of global security policy, standards, guidelines and procedures to ensure ongoing maintenance of security. Physical protection responsibilities will include asset protection, workplace violence prevention, access control systems, video surveillance, and more. Information protection responsibilities will include network and cloud security architecture, network access and monitoring policies, employee education and awareness, and more Lead the information security team to achieve the information security strategy; proactively influence peers and senior leaders in other business units to build a strong security culture Balance the risk between security controls in a strongly-regulated and complex IT environment against the needs for fast revenue growth in a highly competitive industry Understand the threats against the company - who they are, how they operate, what motivates them - and how to allocate the right level of resources to counter them Think creatively about simple, practical, cost-effective solutions for defending the company and customers against increasingly aggressive and sophisticated cyber attackers Prior experience in leading security incident response efforts Articulate complex information security concepts to senior executives and non-technical employees clearly while accurately portraying real risks and threats to the company Lead operational risk management activities to enhance the value of the company and brand Oversee a network of security practitioners and vendors who safeguard the company's assets, intellectual property and computer systems, as well as the physical safety of employees and visitors. Identify protection goals, objectives and metrics consistent with corporate objectives Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology Lead, develop, and oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary. Work with outside consultants as appropriate for independent security audits Demonstrated ability to work under pressure and maintain composure during high-stress situations Experience in establishing, operating, assessing, and maintaining a FISMA/NIST compliant architecture Advanced understanding of security architecture, security technologies, systems design, integration of systems and networking Leads and/or Participates in formal certification, test, and evaluation activities. Working experience in drafting, developing, and submitting Security Assessment and Authorization (SA&A) documentation, System Security Plans (SSP), Security Concept of Operations (CONOPs), Contingency Plans, Security Architectures, Risk Assessment Plan and Plan of Action and Milestones (POAM) Review and/or implement security programs in compliance with FedRAMP and HIPAA/HITECH. ISO 27001 and HITRUST experience strongly desired Establish and maintain a vulnerability management program for corporate and client environments Assist analysts with the review of SAST, DAST, and SCA scans as needed, and provide recommendations on remediation/mitigation approaches Assist analysts with the review and update of SIA, SSP, CP, ISRA, POA&M, and network security diagrams Qualifications: 10 years of information security experience including 5 years as an information security leader, with a demonstrated record of delivering business value BA or BS; MA or MS preferred CISSP required. CISM, C|CISO, CISSP-ISSMP, GSTRT or similar certification security management certification preferred Previous experience in a CISO role is preferred Experience with applicable regulatory and standards frameworks (e.g. FISMA, NIST CSF, FedRAMP, ISO2700x, HIPAA/HITECH, HITRUST etc.) Advanced understanding in one or more of the following areas: Platform Security, Data Security, Network Security, Cloud Security, Physical Security, Security Assessment Tools including SAST, DAST, and SCA, Security Monitoring Tools, and Managed Security Services Advanced understanding in one or more of the following areas: Security Governance Standards, Business Continuity Planning, Enterprise Risk Management, Computer Security Incident Response, and Security Compliance Audits Previous experience preparing updates and presenting to Senior Leadership - provided by Dice
Presidio is a high-performance organization focused on providing holistic, cohesive Contact Center solutions to growing companies. We specialize in providing organizations with Full Life Cycle services in Contact Center and Unified Communications solutions. Our solutions are focused around Cisco, Amazon, Twilio, Google, and Nuance product lines (to name a few). We are Cisco's #2 Gold vendor partner in the US. Our goal is to provide an exceptional customer experience and superior customer satisfaction. We are dedicated to attracting, retaining and continuously developing and training our engineers and technical staff. Our engineers are empowered with responsibility, autonomy and trust. Our commitment to technical leadership is the foundation of our success. Overview: Presidio is seeking a seasoned, customer-facing Senior Project Manager experienced with managing complex Contact Center projects that meet our requirements in the following areas: Cisco Contact Center Express and Enterprise Cisco Unified Communications Cisco Customer Voice Portal WebEx Contact Center and Contact Center Enterprise Amazon Connect Twilio Flex Google CCAI and Dialogflow Our project management approach is based on industry best practices. This is a great opportunity to work with best-in-class technology, team with engineers with deep expertise in their domains and a passion to deliver quality solutions to our customers that go above and beyond the customer's expectations. This position will report to the national Contact Center team. Major Responsibilities: Manages day-to-day client interaction and expectations for multiple and/or large-scale projects Creation of detailed project plans, status reporting and managing issues/risks/actions Manages scope and mitigates risk across projects Manages Project budget and billing Partners across functional teams to deliver the best possible solution for a client Meet with customers during key phases of the project Continually seeks and capitalizes upon opportunities to increase customer satisfaction and deepen client relationships. Escalation point person for the customer, delivery and other associated Presidio teams and vendor partners. Required Experience Bachelor's degree or equivalent experience and/or military experience 12+ years as a hands-on Project Manager managing technical VAR implementation projects and having customer facing experiences. Project Management experience in Contact Center solutions is required Demonstrated ability to plan, organize and successfully drive projects to meet defined budgets and timelines. Ability to manage multiple projects simultaneously Experience managing project financials and scheduling internal resources Strong verbal, written communication and presentation skills Proficient in MS Project PMP knowledge (certification preferred) ITIL knowledge (certification preferred) Competencies Required: A drive for Achievement and Effort, Attention to Detail, Adaptability/Flexibility, Analytical Thinking, Cooperation, Concern for Others, Dependability, Initiative, Independence, Integrity, Persistence, Self-Control, and Stress Tolerance. Physical Requirements May involve extensive periods of sitting in front of a computer, typing, walking, limited bending, and lifting small boxes. ABOUT PRESIDIO Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Cloud and Security solutions to create agile, secure infrastructure platforms for its customers. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design. By taking the time to deeply understand how our clients define success, we help them harness technology advances, simplify IT complexity and optimize their environments today while enabling future applications, user experiences, and revenue models. As of June 30, 2019, we serve approximately 7,900 middle-market, large, and government organizations across a diverse range of industries. Approximately 2,900 Presidio professionals, including more than 1,600 technical engineers, are based in 60+ offices across the United States in a unique, local delivery model combined with the national scale of a $3.0 billion dollar industry leader. We are passionate about driving results for our clients and delivering the highest quality of service in the industry. For more information visit: . Digital Infrastructure: Our Digital Infrastructure solutions help make existing IT infrastructure more efficient, while equipping our clients for a cloud-flexible, mobile-ready, highly secured, insight-driven future. Given the millions of potential configurations across these technologies, our clients rely on our expertise to simplify a highly complex IT landscape, helping to identify and deploy the solutions most appropriate for their business needs. Our Digital Infrastructure solutions scale from workgroup to the largest enterprise requirements. Cloud: We help our clients take cloud strategy and adoption to the next level. Through our advanced cloud solutions practice, combined with Presidio's IT infrastructure expertise, we provide private, hybrid, and multi cloud solutions. By closely aligning our services and solutions with our strategic partners Microsoft Azure™, Amazon Web Services™, Intel ® and VMware™ Presidio offers cloud strategy, architecture and implementation services along with application rationalization and migration across the hybrid and multi-cloud data center environment. In addition, our new and innovative Presidio Cloud Concierge solution provides a foundation for Automation and Self-Services across Clouds to improve productivity and drive increased levels of governance and security. Rather than a "one size fits all" approach, or having to choose between public or private, Presidio tailors a hybrid cloud strategy to meet your unique business requirements. We help our clients accelerate and simplify cloud adoption across the entire IT lifecycle. Security: Our comprehensive security risk methodology gives customers the ability to safeguard their environments and critical business data. This includes continuous threat protection and risk mitigation through the Presidio Cyber Risk Management program, a next generation approach that integrates security strategy, assessments, architecture and remediation, and aligns all of these with organizational goals. Presidio Cyber Risk Management provides clients with a holistic approach for effective security policies and procedures, risk assessment and management, regulatory compliance, incident response, and education and awareness. We use an established risk management methodology and proprietary risk scoring process to provide the IT leader and board of directors with an ongoing view of their organization's risk exposure and remediation path. Presidio is an Equal Opportunity / Affirmative Action Employer / VEVRAA Federal Contractor. All qualified candidates will receive consideration for this position regardless of race, color, creed, religion, national origin, age, sex, citizenship, ethnicity, veteran status, marital status, disability, sexual orientation, gender identification or any other characteristic protected by applicable federal, state and local statutes, regulations and ordinances. To read more about discrimination protections under Federal Law, please visit: (Get Acrobat Reader) If you have any difficulty using our online system and need an accommodation in the job application process due to a disability, please send an email to for assistance. Presidio is a VEVRAA Federal Contractor requesting priority referrals of protected veterans for its openings. State Employment Services, please provide priority referrals to . RECRUITMENT AGENCIES PLEASE NOTE: Agencies Please Note: Agencies may not submit any unsolicited candidate information to any employee of Presidio. Any candidate information received by any employee of Presidio will be considered property of Presidio, unless the submitting agency is an Authorized Vendor who has received a written request to perform recruiting services from a member of Presidio's Talent Acquisition staff. No other Presidio staff member shall be authorized to engage an agency to perform recruiting services. Authorized Vendors have entered into written contracts with Presidio that have been reviewed and executed by the Vice President of Talent Acquisition. Payments will not be made to any agency who is not an Authorized Vendor (nor will they be made to any agency for performing unauthorized services). - provided by Dice
10/02/2020
Full time
Presidio is a high-performance organization focused on providing holistic, cohesive Contact Center solutions to growing companies. We specialize in providing organizations with Full Life Cycle services in Contact Center and Unified Communications solutions. Our solutions are focused around Cisco, Amazon, Twilio, Google, and Nuance product lines (to name a few). We are Cisco's #2 Gold vendor partner in the US. Our goal is to provide an exceptional customer experience and superior customer satisfaction. We are dedicated to attracting, retaining and continuously developing and training our engineers and technical staff. Our engineers are empowered with responsibility, autonomy and trust. Our commitment to technical leadership is the foundation of our success. Overview: Presidio is seeking a seasoned, customer-facing Senior Project Manager experienced with managing complex Contact Center projects that meet our requirements in the following areas: Cisco Contact Center Express and Enterprise Cisco Unified Communications Cisco Customer Voice Portal WebEx Contact Center and Contact Center Enterprise Amazon Connect Twilio Flex Google CCAI and Dialogflow Our project management approach is based on industry best practices. This is a great opportunity to work with best-in-class technology, team with engineers with deep expertise in their domains and a passion to deliver quality solutions to our customers that go above and beyond the customer's expectations. This position will report to the national Contact Center team. Major Responsibilities: Manages day-to-day client interaction and expectations for multiple and/or large-scale projects Creation of detailed project plans, status reporting and managing issues/risks/actions Manages scope and mitigates risk across projects Manages Project budget and billing Partners across functional teams to deliver the best possible solution for a client Meet with customers during key phases of the project Continually seeks and capitalizes upon opportunities to increase customer satisfaction and deepen client relationships. Escalation point person for the customer, delivery and other associated Presidio teams and vendor partners. Required Experience Bachelor's degree or equivalent experience and/or military experience 12+ years as a hands-on Project Manager managing technical VAR implementation projects and having customer facing experiences. Project Management experience in Contact Center solutions is required Demonstrated ability to plan, organize and successfully drive projects to meet defined budgets and timelines. Ability to manage multiple projects simultaneously Experience managing project financials and scheduling internal resources Strong verbal, written communication and presentation skills Proficient in MS Project PMP knowledge (certification preferred) ITIL knowledge (certification preferred) Competencies Required: A drive for Achievement and Effort, Attention to Detail, Adaptability/Flexibility, Analytical Thinking, Cooperation, Concern for Others, Dependability, Initiative, Independence, Integrity, Persistence, Self-Control, and Stress Tolerance. Physical Requirements May involve extensive periods of sitting in front of a computer, typing, walking, limited bending, and lifting small boxes. ABOUT PRESIDIO Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Cloud and Security solutions to create agile, secure infrastructure platforms for its customers. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design. By taking the time to deeply understand how our clients define success, we help them harness technology advances, simplify IT complexity and optimize their environments today while enabling future applications, user experiences, and revenue models. As of June 30, 2019, we serve approximately 7,900 middle-market, large, and government organizations across a diverse range of industries. Approximately 2,900 Presidio professionals, including more than 1,600 technical engineers, are based in 60+ offices across the United States in a unique, local delivery model combined with the national scale of a $3.0 billion dollar industry leader. We are passionate about driving results for our clients and delivering the highest quality of service in the industry. For more information visit: . Digital Infrastructure: Our Digital Infrastructure solutions help make existing IT infrastructure more efficient, while equipping our clients for a cloud-flexible, mobile-ready, highly secured, insight-driven future. Given the millions of potential configurations across these technologies, our clients rely on our expertise to simplify a highly complex IT landscape, helping to identify and deploy the solutions most appropriate for their business needs. Our Digital Infrastructure solutions scale from workgroup to the largest enterprise requirements. Cloud: We help our clients take cloud strategy and adoption to the next level. Through our advanced cloud solutions practice, combined with Presidio's IT infrastructure expertise, we provide private, hybrid, and multi cloud solutions. By closely aligning our services and solutions with our strategic partners Microsoft Azure™, Amazon Web Services™, Intel ® and VMware™ Presidio offers cloud strategy, architecture and implementation services along with application rationalization and migration across the hybrid and multi-cloud data center environment. In addition, our new and innovative Presidio Cloud Concierge solution provides a foundation for Automation and Self-Services across Clouds to improve productivity and drive increased levels of governance and security. Rather than a "one size fits all" approach, or having to choose between public or private, Presidio tailors a hybrid cloud strategy to meet your unique business requirements. We help our clients accelerate and simplify cloud adoption across the entire IT lifecycle. Security: Our comprehensive security risk methodology gives customers the ability to safeguard their environments and critical business data. This includes continuous threat protection and risk mitigation through the Presidio Cyber Risk Management program, a next generation approach that integrates security strategy, assessments, architecture and remediation, and aligns all of these with organizational goals. Presidio Cyber Risk Management provides clients with a holistic approach for effective security policies and procedures, risk assessment and management, regulatory compliance, incident response, and education and awareness. We use an established risk management methodology and proprietary risk scoring process to provide the IT leader and board of directors with an ongoing view of their organization's risk exposure and remediation path. Presidio is an Equal Opportunity / Affirmative Action Employer / VEVRAA Federal Contractor. All qualified candidates will receive consideration for this position regardless of race, color, creed, religion, national origin, age, sex, citizenship, ethnicity, veteran status, marital status, disability, sexual orientation, gender identification or any other characteristic protected by applicable federal, state and local statutes, regulations and ordinances. To read more about discrimination protections under Federal Law, please visit: (Get Acrobat Reader) If you have any difficulty using our online system and need an accommodation in the job application process due to a disability, please send an email to for assistance. Presidio is a VEVRAA Federal Contractor requesting priority referrals of protected veterans for its openings. State Employment Services, please provide priority referrals to . RECRUITMENT AGENCIES PLEASE NOTE: Agencies Please Note: Agencies may not submit any unsolicited candidate information to any employee of Presidio. Any candidate information received by any employee of Presidio will be considered property of Presidio, unless the submitting agency is an Authorized Vendor who has received a written request to perform recruiting services from a member of Presidio's Talent Acquisition staff. No other Presidio staff member shall be authorized to engage an agency to perform recruiting services. Authorized Vendors have entered into written contracts with Presidio that have been reviewed and executed by the Vice President of Talent Acquisition. Payments will not be made to any agency who is not an Authorized Vendor (nor will they be made to any agency for performing unauthorized services). - provided by Dice