IT Network Security Architect at Eversource in Westwood, MAother related Employment listings - Westwood, MA at Geebo

IT Network Security Architect at Eversource in Westwood, MA

The IT Security Architect (ITSA) will work with IT to support all business units and various technology areas to ensure Confidentiality, Integrity and Availability to Eversource systems. The ITSA will succeed by working closely with Eversource project teams, Eversource Business Groups, and the IT Security team to ensure appropriate and effective network security controls are in place for new Eversource initiatives and for existing systems. The ITSA will also lead the network security roadmap for IT Security standards and controls by working with the other IT Architects to ensure the roadmap is aligned with other Eversource domains standards and roadmaps. Understanding and communicating emerging and current network specific security threats and aligning with standards, frameworks and overall business and technology strategy will help direct ongoing modifications to the security roadmap.
Essential Functions:
Develop and recommend network-security technology strategies, publish Eversource network security standards, research network security solutions for IT projects and Infrastructure and develop methods to monitor compliance. Provides network security recommendations and functional requirements to internal IT application and infrastructure groups. Coordinates and resolves complex technical network security problems and challenges. Anticipates and prepares for emerging business, application and infrastructure needs, and translates these needs into network security requirements. Runs and manages research and network security technology evaluation projects. Works with business clients in gathering application requirements, evaluates security risks, provides guidance in implementing a secure design, translates the requirements into application flows. Understands, researches and visualizes application flows and translates those into firewall rules. Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand-based environment, requiring extreme flexibility and responsiveness Produce high quality oral and written work, presenting complex technical matters clearly and concisely with audiences ranging from peers to Senior Management Be familiar with current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy Recommend effective process changes to enhance Eversource Cyber Security Program. Evaluate, test and select security tools, evaluation products and control products. Assist with annual SOX and CIP audits Technical Knowledge/Skill/Education/Licenses/Certifications:
Technical Knowledge/Skill:
Education:
Bachelor's degree in Information Systems or a related technical field or equivalent experience
Experience:
A minimum of 5 to 8 years of experience in the field of network security plus additional experience in IT to equal at least 8 years. Strong working knowledge of firewall systems, cloud security services, security standards and practices. Knowledge across many of these areas:
oStrong networking background, routing, protocols. oEncryption Key Management, Database Security, Enterprise Directory Services, IDS, IPS, Next Generation Firewall, Application Firewall, Cloud SaaS /PaaS/IaaS Security,Industrial Control Systems (i.e., SCADA). oExperience with and knowledge of NIST, ISO27001, COBIT Degree in Information Security or firewall security certification preferred
Salary Range:
$80K -- $100K
Minimum Qualification
Systems Architecture & Engineering, IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.