Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Zero trust cyber architecht image - Rise Careers
Job details

Zero trust cyber architecht

Responsibilities:· Develop Zero Trust implementation roadmaps.· Design and implement technical Zero Trust security solutions.· Work to infuse Zero Trust design principles across all pillars in a Zero Trust model (e.g. Users, Devices, Networks, Applications, Data, etc.).· Coordinate with appropriate organizational stakeholders to ensure Zero Trust is implemented broadly, end-to-end across customer environments.· Support the design and implementation of the client provided Privileged Access Management (PAM) system (currently CyberArk). Troubleshoot where necessary and install and develop new plug-ins and connectors for PAM solutions. Document technical processes and procedures and provide revisions of support documents as necessary.· Support the design and implementation of client selected endpoint security tools (currently Tanium), to include research, analysis, design, implementation, and documentation of new configurations to improve ZT maturity and reduce cyber risk. Troubleshoot where necessary.· Develop, design, and maintain dashboards and analytics with client provided tools (currently Tableau) and integrate with existing governance, risk, and compliance (GRC) tools (currently Archer) to collect, refine, and prepare data for analytics and visualization. Manage and utilize the platform to extract meaningful insights. Prepare reports using various visualization and data modeling methods.· Provide engineering and administration of the client provided Splunk environment consisting of search heads, indexers, deployers, deployment servers, heavy/universal forwarders, and Splunk Enterprise Security premium app, spanning security, performance, and operational roles. Identify and onboard new data sources into Splunk, analyze the data for anomalies and trends, and build dashboards highlighting the key trends in the data. Edit and maintain Splunk configuration files and apps.· Develop and implement security policies (aka “rules”) in tools (e.g., Kion) and programming languages (e.g., Python) for cloud-based resources (e.g., Azure and Amazon Web Services (AWS)) to support configuration monitoring and ongoing understanding of risk. Develop integrations necessary to produce dashboards and cyber “heat maps”.Required Qualifications:· Perform Zero Trust security readiness assessments (e.g. gap analyses, maturity assessments)· Minimum of 8 years of experience in enterprise-wide architecture, engineering, implementation, and integrations.· Minimum 8+ years of experience with enterprise security architecture and designing, building and implementing enterprise IT security systems.· Hands on knowledge of Zero Trust technologies covering IAM, Network Segmentation, and Encryption.· Experience working with cloud-based network infrastructures such as AWS or Azure or Google Cloud. Scripting experience in Python is desired.· Hands on experience with Insider Threat Management, Privileged User Management and metrics generation.· Practical experience with CyberArk, Tanium and Splunk. Linux experience is desired but not required.· 5 years' experience in engineering enterprise IT solutions using NIST SP (e.g.: SP800-60, SP800-64, SP800-80, SP800-122, SP800-137, SP800-146, SP800-160, SP800-204, SP800-207, SP800-213, etc.)235091741
Motion Recruitment Glassdoor Company Review
3.8 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Motion Recruitment DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Motion Recruitment
Motion Recruitment CEO photo
Beth Gilfeather
Approve of CEO

Average salary estimate

$135000 / YEARLY (est.)
min
max
$120000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Zero trust cyber architecht, Motion Recruitment

Are you a specialized Zero Trust Cyber Architect looking for an exciting new opportunity? Join our dynamic team in Arlington, VA! In your role, you'll be pivotal in developing Zero Trust implementation roadmaps and designing robust security solutions that infuse Zero Trust design principles across various pillars such as users, devices, networks, applications, and data. Collaboration is at the heart of this position, as you'll work closely with organizational stakeholders to ensure the comprehensive implementation of Zero Trust across customer environments. Utilizing your expertise in Privileged Access Management (PAM) systems like CyberArk, you'll support installations, troubleshoot, and develop necessary plugins. Your journey will also involve the design and implementation of endpoint security tools like Tanium, enhancing our Zero Trust maturity and reducing cyber risks. Imagine crafting insightful dashboards using Tableau that capture essential data for analytics and visualization, all while integrating seamlessly with onsite governance and risk compliance tools. In this position, you’ll even engage with Splunk environments, analyzing data for trends, creating impactful dashboards, and ensuring optimal configurations. If you have advanced knowledge in Zero Trust technologies, a solid background in enterprise-wide architecture, and a passion for cybersecurity, we can’t wait to meet you!

Frequently Asked Questions (FAQs) for Zero trust cyber architecht Role at Motion Recruitment
What are the main responsibilities of a Zero Trust Cyber Architect at our company?

As a Zero Trust Cyber Architect, your key responsibilities will include developing comprehensive Zero Trust implementation roadmaps, designing secure solutions across various IT components, and coordinating with stakeholders to ensure effective implementation. You’ll troubleshoot and support systems like CyberArk for Privileged Access Management and implement endpoint security tools to enhance Zero Trust maturity. Additionally, your role will involve creating analytics dashboards and administering the Splunk environment for data insights.

Join Rise to see the full answer
What qualifications are needed for the Zero Trust Cyber Architect position?

To excel in the Zero Trust Cyber Architect role, you should have at least 8 years of experience in enterprise-wide architecture and security system implementation. Familiarity with Zero Trust technologies, IAM, and cloud network infrastructures is crucial. Practical experience with tools such as CyberArk, Tanium, and Splunk, along with scripting skills in Python, is highly desirable. Additionally, a strong understanding of insider threat management and security policy development will strengthen your candidacy.

Join Rise to see the full answer
How does collaboration function in the Zero Trust Cyber Architect role?

Collaboration is essential for the Zero Trust Cyber Architect role. You will be working closely with various organizational stakeholders to ensure that Zero Trust principles are implemented systematically across the customer’s environment. This will involve coordinating efforts across departments and facilitating support for the development and deployment of security solutions.

Join Rise to see the full answer
What tools and technologies will the Zero Trust Cyber Architect work with?

In this role, you’ll be working with a range of essential tools and technologies including CyberArk for Privileged Access Management, Tanium for endpoint security, and Splunk for data analysis and monitoring. Additionally, you will utilize Tableau for creating dashboards and will engage with various AWS, Azure, and programming environments while implementing security policies and rules.

Join Rise to see the full answer
What skills are crucial for success as a Zero Trust Cyber Architect?

Success as a Zero Trust Cyber Architect hinges on your technical expertise in Zero Trust technologies, solid understanding of enterprise security architecture, and hands-on experience with cloud infrastructures. Additionally, strong analytical skills for data visualization, troubleshooting abilities for complex systems, and proficiency in scripting, particularly in Python, are crucial. Experience with security frameworks like the NIST SP series can also provide a significant advantage.

Join Rise to see the full answer
Common Interview Questions for Zero trust cyber architecht
Can you explain your experience with Zero Trust security principles?

In your answer, be prepared to explain the core principles of Zero Trust, emphasizing the importance of never trusting and always verifying. Highlight specific projects you've worked on where you implemented these principles, mentioning any challenges faced and how you overcame them to improve security posture.

Join Rise to see the full answer
What tools have you utilized for implementing Privileged Access Management?

Focus on tools like CyberArk and explain your hands-on experience, detailing specific functionalities you’ve implemented or troubleshot. Discuss how you tailored PAM solutions to meet specific organizational needs and your approach to documenting processes and procedures for future reference.

Join Rise to see the full answer
How do you assess an organization's Zero Trust readiness?

Describe your approach to conducting Zero Trust security readiness assessments, such as gap analyses or maturity assessments. Provide examples of assessments you’ve completed, emphasizing how your findings influenced security strategies and implementations within the organization.

Join Rise to see the full answer
What is your process for designing and maintaining security dashboards?

Share your experience in utilizing tools like Tableau to design and create meaningful dashboards. Discuss how you determine key metrics, gather data, and keep dashboards relevant and insightful, ensuring they support security compliance and risk management initiatives.

Join Rise to see the full answer
Describe your experience with cloud-based security architectures.

In your response, discuss specific cloud platforms you’ve worked with, such as AWS or Azure. Detail how you've integrated Zero Trust principles within these platforms, including any challenges faced and the security measures put in place to protect cloud resources.

Join Rise to see the full answer
What scripting languages are you proficient in, and how have they contributed to your work?

Highlight your proficiency in languages like Python, providing concrete examples of scripts you've created. Share how these scripts helped automate processes, enhance monitoring systems, or improve compliance within security frameworks.

Join Rise to see the full answer
How do you keep up-to-date with trends in cybersecurity, especially regarding Zero Trust?

Discuss your commitment to continuous learning in cybersecurity. Mention any professional development avenues you pursue, such as attending conferences, participating in online courses, or following industry influencers to stay informed about Zero Trust advancements.

Join Rise to see the full answer
Can you provide an example of a security challenge you faced and how you resolved it?

Prepare a detailed scenario that outlines the challenge you encountered, your analysis of the situation, and the steps taken to resolve it, including any collaboration with others. This demonstrates your problem-solving skills and ability to work under pressure.

Join Rise to see the full answer
What does the term 'least privilege' mean in a Zero Trust environment?

Explain that 'least privilege' refers to granting users and devices the minimum access necessary for their roles. Discuss how implementing this principle in Zero Trust can mitigate risks and enhance security, using examples from your experience.

Join Rise to see the full answer
How do you approach integration with existing security tools and systems?

Describe your methodology for ensuring smooth integration of Zero Trust solutions with existing tools, providing examples where necessary. Emphasize collaboration with stakeholders and thorough testing to ensure that new systems enhance rather than disrupt current security measures.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 10 days ago
Photo of the Rise User
Posted 16 hours ago
Photo of the Rise User
Posted 13 days ago
Photo of the Rise User
Nuovo Photography Hybrid No location specified
Posted 13 days ago
Photo of the Rise User
Posted 10 days ago
Photo of the Rise User
Nine Remote 1 Denison St, North Sydney NSW 2060, Australia
Posted 2 days ago

Within the IT landscape, change is constant. Emerging new tech trends, project shifts, mergers and acquisitions, and even macroeconomic influences can all make planning for your team’s expansion or your own tech career, well, overwhelming. We und...

199 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 8, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!