Design and institutionalize enterprise security and technology patterns.
Assist teams on initiatives by providing tactical and architectural considerations for legacy solutions.
Evaluate new implementations, navigating complex organizational environments and diverse stakeholders to deliver sound analyses and actionable recommendations.
Independently manage a portfolio of work using existing process documentation, templates, systems, and resources.
Support issue resolution by effectively communicating concerns and operationalizing Security Architecture practices.
Extend the scope of ITD Governance and Security Architecture.
Create and share clear, impactful architecture artifacts, including:
Standards and guidelines
Management briefs
Security training materials
Updated processes
Knowledge base articles
PowerPoint presentations
Visio process diagrams
Power BI dashboards
Excel reports
Collaborate with business areas and enterprise architects to understand business needs and provide strategic consultation on secure, risk-averse implementations.
Conduct security compliance tasks, control evaluations, risk analyses, and exception documentation.
Support vulnerability management by ensuring data quality and ingestion for remediation team use.
Integrate security into architecture roadmaps and ensure inclusion of security best practices in others’ roadmaps.
Research and share insights on architecture governance, controls, and peer review processes, especially regarding platform technology, security, and cloud.
Document process diagrams and draft narratives or executive summaries.
Create business-focused documentation tailored to technical and non-technical audiences.
Provide written guidance aligning with security policies and standards.
Partner with architects and technical teams to develop strategic roadmaps and support achievement of agency KPIs.
7 years of knowledge and application of security best practices
7 years of experience creating executive-facing security recommendations
3 years of knowledge in IT Governance and Compliance
3 years of experience in business writing and presenting
4 years of educational or career experience in Cybersecurity, Government technology implementation, IT Governance, or related fields
7 years of experience in risk-based analysis
3 years of experience in process modeling using Visio
3 years of experience with PowerBI for data visualization and reporting
3 years of experience using SharePoint for organizing, sharing, and retrieving resources
...Outstanding position for the right fit! We are currently seeking a Vascular Surgeon to join our growing team in New Jersey servicing our patients in Nursing homes and clinics as we further extend our operations. Responsibilities: Be aware...
...American Vascular Associates is a leading healthcare provider dedicated to delivering exceptional patient care. Our state-of-the-art outpatient... ...care. We are seeking a highly skilled and dedicated Vascular Surgeon to join our outpatient center team. The ideal candidate will...
...Pay: $63.50/hr- 100% Remote Job Decritpion: User interface (UI) designers work closely with user experience (UX) designers and other design specialists. Their job is to make sure that every page and every step a user will experience in their interaction...
...PM2CM, Inc. is seeking a highly skilled Plumbing Surveyor Field Supervisor to join our team. As a Plumbing Surveyor Field Supervisor, you will play a vital role in overseeing and managing plumbing projects for our clients. With a strong focus on program and project management...
...Job Title: Caregiver for Teen Location: Bloomfield Hills, MI Job Type: Part-Time Compensation: Weekly Pay Benefits: Paid Training Provided We are seeking a patient, compassionate, and reliable caregiver to support a 15-year-old male living with anorexia...