Previous Job
Previous
Commonwealth Security Architect
Ref No.: 18-00143
Location: Chester, Virginia
Start Date: 02/22/2018
This position serves as the Information Security Architect for the Commonwealth and works across internal and external entities to provide a common technical security architecture. This position will also review proposed changes and projects relative to the VITA and Customer Information Technology environments for Security impact and assist in recommending secure options to meet business needs; evaluate new products and vendor offerings for use within VITA and Customer environments; develop Commonwealth of Virginia and VITA security architecture policies and procedures. In addition, this position will work to maintain close contact with internal and external security organizations and constantly monitor the potential security threats and their defense.

Comprehensive experience in industry or state; Substantial technical experience in one or more of the following: LAN/WAN networking, Systems Administration of both Windows and Unix based platforms, firewalls, IDS/IPS design and implementation, computer forensic techniques, databases, web and mail servers, and general systems design and operation required; Experience in the development and presentation of information security architecture policies, standards and procedures; Experience in monitoring IT environments for compliance with information security architecture policies and standards; Skilled in oral and written communication as it pertains to technical information; Skilled in interpreting complex information and providing informed analysis; Proven ability to lead and manage teams and projects; Demonstrated ability to work with all levels of management and external interfaces such as Agencies and service providers and Proficient with the Microsoft Office products (Word, Excel, PowerPoint, and Outlook). High School Graduate or equivalent.

Skill Required / Desired Amount of Experience
technical experience Required 5 Years
reviews of proposed changes to the security of an IT environment Required 3 Years
development and presentation of Information Security Architecture policies standards and procedures Required 3 Years
monitoring IT environments for compliance with Information Security Architecture Required 3 Years
review security impact and recommend secure options to meet business needs Required 3 Years
monitor potential security threats and associated remediation actions Required 2 Years
evaluate new products and vendor offerings Required 2 Years
work closely with external security organization to constantly monitor potential security threats and defense Required 3 Years