Security Architect - IAM - Hybrid

Check with seller
Architect / Interior Designer Jobs
1 month
United States
Texas
0 views
ID: 702675
Published 1 month ago by Baylor Scott White Health
Check with seller
Dallas, Texas, United States
Get directions →
0 item views
JOB SUMMARY

The Security Architect is a senior security resource that provides enterprise guidance on security related issues, including but not limited to technical infrastructure, processes, design, assessment, implementation, awareness, and governance. Security Architect provides leadership, experience and expertise to project teams. Develops and participates in complex security program management and design. Ensures alignment of security controls to risk as it relates to individual business units and enterprise and provides guidance accordingly. Serves as a security subject matter experienced as part of an in-house, on-shore, and off-shore security architecture team accountable for securing the enterprise information and systems by establishing security requirements across enterprise projects; planning, designing, and documenting security systems; preparing security standards, policies, and procedures.

ESSENTIAL FUNCTIONS OF THE ROLE
• Ability to perform complex and systemic risk assessment and help project efforts to attain timely and effective secure designs.
• Investigates and resolves problems, inefficiencies and enhances the enterprise risk mitigation stance. Possess deep technical knowledge and demonstrated the ability to apply security related knowledge for practical and timely outcomes.
• Must be able to effectively communicate the conceptual and straightforward design of holistic enterprise security solutions.
• Must be able to function as a technical change agent when appropriate so that enhancements to BSWH security can happen without introducing material un-planned impacts to projects (e.g. security, time, budget or scope.) This must often be done by creating new approaches when legacy standards and directives don’t cover the situation well or there are insurmountable and conflicting business requirements.
• Correlate data and reports from different sources, make reasoned inferences about that data, and be able to publish results. Ability to develop tools and scripts to aid in data processing or other aspects of log and or security research.
• Make / Implement recommendations for improvements in processes and procedures. Evaluate alerts and reports to assist in tuning security systems for accurate results.
• Participate and/or Run projects as requested.
• Assist to remediate compromised endpoints through established processes and procedures and with the current toolset.
• Review detailed log study. Provides / Review recommendations for remediation based on that review, correlation and log study. Prepare reports as requested.
• Configure IAM standards and controls
• Configuration of defined sustainability procedures related to Security Operations Management and IAM initiatives
• Providing workflow recommendations and completing provisioning configuration and entitlement management based on regulatory needs
• Implementing entitlement management solutions for role-based access controls and provisioning procedures for both external and internal application needs (understanding of multiple methods of role management)
• Supporting the implementation of IAM configuration for the joiner, mover, and leaver scenarios across in-scope platforms and applications (also includes complete user scenarios including recertification, password reset functionality, reporting, etc.)
• Analyzing and resolving complex authentication, integration, and automation issues

KEY SUCCESS FACTORS
• Deep data-based skills with sound and straightforward problem-solving capabilities.
• Experience in writing enterprise-level architecture documentation and testing.
• Excellent critical thinking and rationale skills to resolve security challenges.
• Excellent written and verbal communication skills; Demonstrated ability to effectively explain complex concepts to others in less complex terms.
• Ability to work with others in teams and share testing and partner well on problems.
• Ability to work efficiently and accurately under pressure with tight deadlines.
• Self-motivated to identify and resolve issues in a large enterprise environment.
• Must be flexible in filling various roles in project management processes

BENEFITS

Our competitive benefits package includes the following
• Immediate eligibility for health and welfare benefits
• 401(k) savings plan with dollar-for-dollar match up to 5%
• Tuition Reimbursement
• PTO accrual beginning Day 1

Note: Benefits may vary based upon position type and/or level

PREFERRED QUALIFICATIONS
• Development languages: Java, javascript, XML, powershell, shell, SQL
• OS: Windows, Redhat
• Databases: SQL Server, Postres
• Authentication protocols: Kerberos, SAML
• Internal Tools: VSCode, Bitbucket / GIT

MINIMUM QUALIFICATIONS
• EDUCATION - Bachelor's or 4 years of work experience above the minimum qualification
• EXPERIENCE - 5 Years of Experience Read more

Published on 2025/09/10. Modified on 2025/09/10.

Description

JOB SUMMARY

The Security Architect is a senior security resource that provides enterprise guidance on security related issues, including but not limited to technical infrastructure, processes, design, assessment, implementation, awareness, and governance. Security Architect provides leadership, experience and expertise to project teams. Develops and participates in complex security program management and design. Ensures alignment of security controls to risk as it relates to individual business units and enterprise and provides guidance accordingly. Serves as a security subject matter experienced as part of an in-house, on-shore, and off-shore security architecture team accountable for securing the enterprise information and systems by establishing security requirements across enterprise projects; planning, designing, and documenting security systems; preparing security standards, policies, and procedures.

ESSENTIAL FUNCTIONS OF THE ROLE
• Ability to perform complex and systemic risk assessment and help project efforts to attain timely and effective secure designs.
• Investigates and resolves problems, inefficiencies and enhances the enterprise risk mitigation stance. Possess deep technical knowledge and demonstrated the ability to apply security related knowledge for practical and timely outcomes.
• Must be able to effectively communicate the conceptual and straightforward design of holistic enterprise security solutions.
• Must be able to function as a technical change agent when appropriate so that enhancements to BSWH security can happen without introducing material un-planned impacts to projects (e.g. security, time, budget or scope.) This must often be done by creating new approaches when legacy standards and directives don’t cover the situation well or there are insurmountable and conflicting business requirements.
• Correlate data and reports from different sources, make reasoned inferences about that data, and be able to publish results. Ability to develop tools and scripts to aid in data processing or other aspects of log and or security research.
• Make / Implement recommendations for improvements in processes and procedures. Evaluate alerts and reports to assist in tuning security systems for accurate results.
• Participate and/or Run projects as requested.
• Assist to remediate compromised endpoints through established processes and procedures and with the current toolset.
• Review detailed log study. Provides / Review recommendations for remediation based on that review, correlation and log study. Prepare reports as requested.
• Configure IAM standards and controls
• Configuration of defined sustainability procedures related to Security Operations Management and IAM initiatives
• Providing workflow recommendations and completing provisioning configuration and entitlement management based on regulatory needs
• Implementing entitlement management solutions for role-based access controls and provisioning procedures for both external and internal application needs (understanding of multiple methods of role management)
• Supporting the implementation of IAM configuration for the joiner, mover, and leaver scenarios across in-scope platforms and applications (also includes complete user scenarios including recertification, password reset functionality, reporting, etc.)
• Analyzing and resolving complex authentication, integration, and automation issues

KEY SUCCESS FACTORS
• Deep data-based skills with sound and straightforward problem-solving capabilities.
• Experience in writing enterprise-level architecture documentation and testing.
• Excellent critical thinking and rationale skills to resolve security challenges.
• Excellent written and verbal communication skills; Demonstrated ability to effectively explain complex concepts to others in less complex terms.
• Ability to work with others in teams and share testing and partner well on problems.
• Ability to work efficiently and accurately under pressure with tight deadlines.
• Self-motivated to identify and resolve issues in a large enterprise environment.
• Must be flexible in filling various roles in project management processes

BENEFITS

Our competitive benefits package includes the following
• Immediate eligibility for health and welfare benefits
• 401(k) savings plan with dollar-for-dollar match up to 5%
• Tuition Reimbursement
• PTO accrual beginning Day 1

Note: Benefits may vary based upon position type and/or level

PREFERRED QUALIFICATIONS
• Development languages: Java, javascript, XML, powershell, shell, SQL
• OS: Windows, Redhat
• Databases: SQL Server, Postres
• Authentication protocols: Kerberos, SAML
• Internal Tools: VSCode, Bitbucket / GIT

MINIMUM QUALIFICATIONS
• EDUCATION - Bachelor's or 4 years of work experience above the minimum qualification
• EXPERIENCE - 5 Years of Experience
Baylor Scott  White Health
Baylor Scott White Health
10613 active listings

Recently viewed

Audax Architecture Inc. Audax Architecture Inc. 1 month
Architectural Designer / Technologist
Check with seller
Architectural Designer / Technologist
Job description Architectural Designer / TechnologistStart Date: A.S.A.P.About AudaxAudax is a vertically integrated organization that provides Architecture, Interior Design, and Construction Management services to the luxury real estate market with a strong focus on high-end residential work. The services are performed by the sister companies Audax Architec...
1 month Architect / Interior Designer Jobs views
Check with seller
Auckland Transport Auckland Transport 1 month
BPO Jobs 1 month
Operations Planning Manager
Check with seller
Operations Planning Manager
o wai mātou | About us  Nōu te rourou - What's in it for you?   At AT, we embrace inclusion and fully support building a diverse workplace where people come first and we feel safe, respected, valued and supported, inclusive of our differences. Our values are more than just words - they are integral to everything we do. Manaakitanga - We care, Tiakitanga - Sa...
1 month BPO Jobs views
Check with seller
Are you a professional Recruiter? Create an account