Sunshine Enterprise USA

Security Architect – Consultant

Sunshine Enterprise USA

full-time

Posted on:

Location Type: Remote

Location: South CarolinaUnited States

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Support security automation and Identity & Access Management (IAM) initiatives
  • Implement Identity & Access Management (IAM) solutions
  • Develop automation for disparate security and IT tools using Python, Bash, and other technologies
  • Plan and execute mitigation strategies for known and emerging security threats
  • Ensure consistent application of security measures across business applications and infrastructure
  • Conduct security monitoring, SIEM analysis, and reporting
  • Ensure adherence to security frameworks (e.g., NIST CSF, CJIS, IRS 1075, CMS MARS-E)

Requirements

  • 10+ years of experience in IAM Security Architecture
  • 5+ years of automation development experience using Python and Bash
  • 5+ years of experience with IAM, identity and access controls, logging, and reporting systems
  • 5+ years of cyber security awareness and applied knowledge
  • 5+ years working with Linux, Windows, and network security protocols
  • Experience supporting large IT environments or system deployments
  • Strong SIEM analysis and reporting skills
  • Understanding of application security (AppSec) principles
  • Preferred: Knowledge of SIEM analysis and reporting
  • Preferred: Knowledge of Security Frameworks including: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
  • Preferred: Knowledge of application security (APPSEC)
  • Preferred: CISSP, CISA, CISO or equivalent advanced security certification
  • Preferred: Additional relevant certifications include CEH, OSCP, GPEN
  • Preferred: Vendor Certifications in SIEM or logging technologies.
Benefits
  • Equal Opportunity Employer

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
PythonBashIAMautomation developmentSIEM analysissecurity monitoringapplication securitynetwork security protocolslogging systemsmitigation strategies
Certifications
CISSPCISACISOCEHOSCPGPENvendor certifications in SIEMvendor certifications in logging technologies