Job: Enterprise Architect—IAM/ Security
Location: 1616 Woodall Rodgers Fwy – hybrid onsite 1-2 days/week (when needed) will be more onsite in the beginning to meet with security engineers/admins then will scale back.
(Dallas locals ONLY)
Term: 12+ months Contract (high probability to extend) -
their average architect tenure is 8 yrs as contractors
Top Qualifications
10+ years’ experience in IT risk management and information security
- Strong IAM experience
- Network Security
- Endpoint Security
- Threat Modeling
- Risk Modeling
- Firewalls, Managed Threat Response
- AWS or Azure (cloud Security) experience
- RedHat OpenShift or Kubernetes experience
- Microservices and APIs experience
Certificates for Security: CISSP HIGHLY preferred
What Tech Stack Using Now
- Node.js, React.js, Microservice, Containers, REST APIs, Mobile, Trying to find a new mobile framework (Mobile isn't necessary)
- Cloud: AWS, eventually will do Azure
- Rosa (RedHat OpenShift), OpenShift, Kubernetes
This position is responsible for planning, designing, building, and testing security solutions and capabilities within Oncor’s Technology Organization. By identifying areas of weakness, staying up to date with the latest security standards, and having a thorough understanding of Oncor’s IT systems, the security architect identifies possible security threats to prevent a cyber breach.
Additionally, this position works cooperatively with a team that develops concepts, strategy and tactical processes into changing grid operations and landscapes.
Responsibilities
Participate in the Architecture Review Board (ARB) including:
- Participate in discussion and approval of all projects, procedures, and policies presented to the ARB
- Approve of security-focused project designs that can be approved outside the ARB
- Validate and prepare security-focused projects, designs, procedures, or processes prior to them being presented to the ARB
- Participate in Enterprise Solution Review Board
- Ensure that proposed solutions align with Enterprise Architecture Strategies
- Speak to the collaborative design of the solution and key decisions made for the design
- Work with security teams from Cybersecurity, DGM, and Smart Grid Capabilities to create, maintain & enforce the Enterprise Architecture Strategies & Guidelines for areas including, but not limited to:
- Application Security
- Network Security
- Virtual Private Networks (VPN)
- Identity and Access Management
- Data Security
- Cloud Security
- Critical Infrastructure Protection (CIP) Systems
- Transient Devices
- Control System Security
- Cyber Security Monitoring and Protection solutions
- Encryption
- Create and/or validate the security elements of a design for projects a fellow Enterprise Architect is the primary architect on
- Participate in vendor and product selection process on security focused and non-security focused initiatives
- Participate in the validation and approval of submissions of PC Order Software Request JIRA process by approving software requests which require a specific security focused architectural review
- Participate in the Technology Strategy team Product Roadmap Initiative by providing recommendations for new products, consolidation, prioritization, decommission, implementation timing and dependencies
- Perform role of Primary Enterprise Architect to assigned projects & efforts within the following capabilities:
- Cybersecurity, DGM, and Smart Grid
- For assigned projects & efforts:
- Integrate with technology capability project teams to:
- Assist with high-level and low-level designs
- Ensure architecture guidelines & policies are followed
- Ensure industry best practices are followed
- Ensure regulatory, legal or policy requirements are followed
- Formulate acceptable processes and use cases
- Ensure solution will deliver all functional & non-functional requirements
- Ensure solution allows Oncor to remain cyber safe & secure
- Validate design vs. as built architecture at the completion of projects
- Participate in the open form discussions around changing threat landscape, evaluate risk and provide recommended changes to defense postures.
Technology Capability Teams
- Provide guidance, troubleshooting, and recommendations during the design, build and implementation of security systems and controls within Oncor’s IT and Industrial Control networks
- Understand, share, advise and recommend on associated cybersecurity standards, systems and authentication protocols, cybersecurity working groups and current cybersecurity best practices / processes
- Proactively identify and document cybersecurity design gaps in existing and proposed architecture. Recommend changes or enhancements in accordance with enterprise architecture strategy, cybersecurity standards, frameworks and best practices
- Participate in Cybersecurity Review Board(s)
- Participate in security-related incidents as needed and provide input and guidance on post-event analysis
- Review, modify and/or approve all Security Questionnaire submissions
- Review and document changes or modifications of cybersecurity technical guidelines/procedures/ policies related to projects or efforts
- Actively engage in vulnerability assessments and provides recommended mitigations or actions
- Participate in the development of cyber awareness programs and delivery
- Review system requirements and logging needs for new and existing projects or efforts in accordance with Oncor’s logging standard and needs
- Review application scan outputs on systems and their code for security risk and provide recommended solutions
Experience, Qualifications, & Skill Requirements
- 10+ years’ experience in IT risk management and information security
- IT security or risk assessment certifications are advantageous
- Strong working knowledge of IT risks, cyber security, and computer operating software
- Advanced understanding of security protocols, cryptography, and security
- Great communication and interpersonal skills
- Experience implementing security solutions
- Comfortable working on a team
Measures of Success
- Ability to self-initiate projects, analyze, and deliver strategic cybersecurity assessments / recommendations on time and within budget
- Intellectually curious and takes a pro active approach to solving problems or answering strategic questions
- Sought after by peers and Oncor leaders for expertise and leadership within cybersecurity