We are looking for a Senior Data Security Architect! The Data Security Architect Senior is responsible for ensuring the confidentiality, availability, and integrity of IDS information assets, and protecting them from unauthorized disclosure, modification, and destruction. This position will develop and promote the Information Security Strategic Plan and IDS Information Security Policies, audit compliance with Security Policies, and lead remediation initiatives. Develops and maintains cybersecurity infrastructure and application standards. Participates in the IT Architecture Board.. Monitors organization and IS administrators’ compliance to established Security policy. Quarterly vulnerability reviews published to IS Management. Identify, track and manage outstanding vulnerabilities. Complex incident forensics spanning IDS. Confidential investigations such as HR events, internal security, and “need to know” situations. Think you’ve got what it takes?
ESSENTIAL DUTIES AND RESPONSIBILITIES
Responsibility A: SailPoint Architecture Design and Enhancement
– Develop and configure code for all components of the IdentityIQ solution.
– Demonstrate strong expertise in XML, Java, JavaScript, BeanShell, IDE/Code Repository, Server OS, Tomcat, JDBC/SQL, and IdentityIQ configuration and API.
– Identify opportunities for automation, evaluate new tools, and implement technology that adds value to the organization.
– Implement and configure SailPoint IdentityIQ (IIQ) to ensure seamless integration with upstream and downstream systems.
– Develop provisioning functionality, data mapping rules, and efficient workflows within the SailPoint ecosystem.
– Provide comprehensive support for end-to-end development and deployments, including user acceptance testing.
– Collaborate with cross-functional teams to gather and analyze requirements, translating them into effective solutions.
– Continuously enhance and optimize SailPoint configurations to align with evolving business needs.
– Stay current with SailPoint IIQ updates and industry best practices to drive ongoing improvements.
– Identify, troubleshoot, and resolve SailPoint-related functional and technical issues.
– Implement new code into UAT and Production as part of the system development lifecycle.
– Identify and communicate high-level gaps and issues in primary functional areas.
– Work closely with integration stakeholders to understand requirements and drive the design, development, and implementation of IAM systems and processes.
– Implement and customize workflows, forms, rules, provisioning, certifications, and connectors.
– Resolve issues highlighted during System Integration Testing and User Acceptance Testing.
Responsibility B: Develop Information Security Strategy. Coordinate Security implementations across IS Disciplines and user departments
– Outlines long-term technical security requirements assimilating governmental regulations, evolving technical threats, and IDS goals.
– Define, document, publish, and enforce architectural and security applications standards consistent with organizational objectives.
– Research evolving threats to confidentiality, integrity, and availability of information assets and lead initiative to prevent unauthorized disclosure, modification, of destruction of IDS information assets.
– Leads development of guidelines that assist project managers in development of disaster recovery procedures and contingency plans and risk assessments for all applications.
– Help develop the IDS and IS strategic plan and identify possibilities to advance IDS and IS strategic plan within IS Security.
– Promotes IS Security plan throughout IDS.
– Participates in the IT Architecture Board (ITAB) and provides cybersecurity architecture and standards guidance
Responsibility C: Architect, Implement, and Document Security Infrastructure. Established DRBCP architecture and solutions. Plans and initiates projects related to the design and implementation of security infrastructure and applications.
Architect systems that provide security policy monitoring and enforcement.
Implement monitoring and enforcement tools.
Implement a toolkit and methodology for forensic analysis.
Document security infrastructure for operations support.
Works with departments outside IS to achieve specific security compliance required for statutory and / or regulatory
requirements (HIPPAA, GLB, PCI, JHACO, etc.)
Works with internal and external auditors and consultants to explain security related to their reviews. Reviews findings
and recommendations and responds to them appropriately through their management.
Responsibility D: Advocate for security awareness and training. Manage complex customer interactions,
regulatory changes, and innovations appropriately. Guides training framework for Sr. Data Security Analysts and Data Security Architects
Develops and promotes educational guides, presentations, and FAQs for IDS employees.
Develops and promotes security reference guides for technical support personnel.
Develops documentation requirements for IS Security technology.
Advocates IS Security initiatives such as business continuity, policy compliance, and secure system implementation.
Knowledge and Skills
• SailPoint IdentityIQ
– BeyondTrust (PAM solution experience)
– Risk analysis of computer network systems and applications with Management level reporting.
• Disaster recovery and business continuity planning and testing.
• BeyondTrust implementation and design experience.
• Government and regulatory guidelines such as PCI, GLB, SarbOx, HIPAA
• Analyze complex technical problems and communicate solutions to diverse audiences, including executive management, technicians, and end-users.
• Operate independently within the framework of IDS policies and procedures.
• Plan, initiate, and manage complex projects with management reporting and project tracking.
• Establish the credibility of Data Security and positively influence the direction of Information Services.
• Demonstrate strategic analysis and planning.
• Develop and implement security certification procedure.
• Specialization as demonstrated by completion of accredited curriculum in 1 or more areas:
• Powershell scripting experience
QUALIFICATIONS
Education
– H.S. Diploma or GED required
Preferred Licenses and Certifications
– CISSP – Cert.Info.Sys Security Profes. ISC2
– SANS – SysAdmin, Audit, Network, Sec. SANS
– HCISPP – Cert.Info.Sec.Priv.Profes. ISC2
– Security+ CompTIA
– CCSP Cert.Cloud.Sec.Profes. ISC2
– SSCP Sys.Sec.Cert.Profes. ISC2
Experience
– 10 years’ experience in information security, computer management, identity access management, or IS networking, including at least 5 years of information
security experience
Additional Experience
Associates degree will substitute for 2 years of experience. A bachelor’s degree will substitute for 4 years of experience.Since 1954, Texas Children’s has been leading the charge in patient care, education and research to accelerate health care for children and women around the world. When you love what you do, it truly shows in the smiles of our patient families, employees and our numerous accolades such as being consistently ranked as the best children’s hospital in Texas, and among the top in the nation by U.S.News & World Report as well as recognition from Houston Business Journal as one of this city’s Best Places to Work for ten consecutive years.
Texas Children’s comprehensive health care network includes our primary hospital in the Texas Medical Center with expertise in over 40 pediatric subspecialties; the Jan and Dan Duncan Neurological Research Institute (NRI); the Feigin Center for pediatric research; Texas Children’s Pavilion for Women, a comprehensive obstetrics/gynecology facility focusing on high-risk births; Texas Children’s Hospital West Campus, a community hospital in suburban West Houston; and Texas Children’s Hospital The Woodlands, the first hospital devoted to children’s care for communities north of Houston. We have also created the nation’s first HMO for children, established the largest pediatric primary care network in the country and a global health program that is channeling care to children and women all over the world. Texas Children’s Hospital is also academically affiliated with Baylor College of Medicine, one of the largest, most diverse and successful pediatric programs in the nation.
To join our community of 14,000+ dedicated team members, visit texaschildrenspeople.org for career opportunities. You can also learn more about our amazing culture at infinitepassion.org .
Texas Children’s is proud to be an equal opportunity employer. All applicants and employees are considered and evaluated for positions at Texas Children’s without regard to mental or physical disability, race, color, religion, gender, national origin, age, genetic information, military or veteran status, sexual orientation, gender identity, marital status or any other protected Federal, State/Province or Local status unrelated to the performance of the work involved.
Alternatively, you can view other roles for reentry opportunities at https://reentrycareers.com/
Tagged as: Freelance