PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…

ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of Cyber Architect Consultant:
-
Employment Type:
Full-Time
-
Location:
Raleigh, NC (Onsite)
Do you meet the requirements for this job?
Cyber Architect Consultant
Job ID: 25-64122
Pay Range: $118 - $121/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
- Architecting effective and efficient fit for purpose solutions - includes creation of Cybersecurity Blueprints that will present detailed views of application interaction/integrations between both on prem and cloud-based applications.
- Applies in-depth and specialized expertise in Identity and Access Management and significant breadth of experience across cyber / information security.
- Participates in the gathering and development of requirements by coaching stakeholders and decomposing business requirements into technical and system requirements
- Creates architectures and operational documentation with support of engineering and operations staff
- Participate in the overall Identity ecosystem convergence activities
- Advise, consult, lead, guide and mentor project teams, engineers, analysts, and support staff in the delivery of solutions
- Participate in the agile planning processes and delivery methodologies
- Conducts threat modeling and security gap assessment exercises in concert with other teams
- Create reusable patterns for reoccurring cyber challenges
- Contributes to the creation of policy, standards, Minimum Security Baselines (MSBs), procedures and guidelines
- Bring visibility to and escalates security risks, as well as, technical, execution, deployment, or other risks as applicable
- Lead Proof of Concept/Value Exit Read outs by communicating results and recommendations to stakeholders
- Conducts post-mortem reviews of projects / products to measure design versus implementation differentials
- Contribute to the Client Cyber Architecture Practice by supporting Cyber Enterprise Architecture objectives
Key Requirements and Technology Experience:
- Key skills; Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management, , NIST SP800-series, NIST Cybersecurity Framework, FIPS 140-2, Common Criteria, FISMA/FedRAMP, ISO 27000, PCI-DSS, CIS Benchmarks, Certification: CISSP-ISSAP, AWS, AZURE, SANS or TOGAF certifications.
- The candidate must be a highly experienced subject matter expert role with either deep specialization or comprehensive knowledge within a discipline which crosses multiple areas of specialization relative to Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management.
- We need someone with deep knowledge/experience with securing complex AWS architectures.
- Understanding of Security foundations and Standards such as hardening, least privilege, attack surface reduction, NIST SP800-series, NIST Cybersecurity Framework, FIPS 140-2, Common Criteria, FISMA/FedRAMP, ISO 27000, PCI-DSS, CIS Benchmarks, and similar.
Our client is a leading Banking Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy
. #cha J2W:CB3