Sr. Cloud Security Architect
Apply NowCompany: Veracity Solutions
Location: Berkeley Heights, NJ 07922
Description:
Job Title: Sr. Cloud Security Architect
Job Location: Omaha, NE, Berkeley Heights, NJ, or Frisco, TX (100% Onsite - local only, no relocation)
# Positions: 1
Employment Type: FTE
Key Technology: Azure Cloud, Security, Identity and Access Management (IAM), Zero-Trust, Risk Management, FedRAMP
Job Responsibilities:
Recruiter Submission Template:
Evaluation Benchmarks Self-Assessment (1-5) Experience (In years) Notes/Comments Must possess Azure Expertise:
Microsoft Azure Cloud experience (GovCloud preferred).
Familiarity with Azure security tools/platforms (e.g., Azure AD, Sentinel, Defender, Monitor, Key Vault). 5+ years of cyber-related experience in a commercial environment with Azure, focusing on technical information security and risk management. Must have experience with Security Proficiency: Identity Access and Management concepts (including multifactor authentication and SSO/Federation), Privileged Access, Vulnerability testing for Azure, Understanding of CI/CD pipelines and software Cloud Security Domains experience: Demonstrated expertise in Information Security and Risk Management across Windows and Linux Familiarity with key domains: Identity, Credential, and Access Management (ICAM), Authentication and Authorization (including SSO and Identity Federation), Zero-Trust, Defense-In-Depth, Governance and Compliance. Data Security, Operating System Security, Network Layer Protection, Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response, Cloud Core Platform (Compute, Storage, Networking).
Job Location: Omaha, NE, Berkeley Heights, NJ, or Frisco, TX (100% Onsite - local only, no relocation)
# Positions: 1
Employment Type: FTE
Key Technology: Azure Cloud, Security, Identity and Access Management (IAM), Zero-Trust, Risk Management, FedRAMP
Job Responsibilities:
- Design Azure Cloud Security Solutions: Develop and architect secure solutions for Azure cloud environments, ensuring alignment with business and security needs.
- Lead Architecture Reviews: Lead decision-making and architecture review processes, creating decision records and ensuring architecture quality.
- IAM & Posture Management: Oversee Identity & Access Management (Entra ID/Azure AD), posture management, and workload protection, including SIEM/SOAR integration.
- Collaboration with Agile Teams: Work closely with agile teams to integrate security needs into infrastructure and application development.
- Continuous Monitoring & Compliance: Ensure continuous monitoring of security policies, compliance artifacts, and systems authorization. Align security controls with compliance requirements.
- Zero-Trust Architecture: Design and implement Azure Zero-Trust architecture solutions, ensuring seamless integration into cloud security strategies.
- Risk Mitigation & Vulnerability Remediation: Lead risk reduction and vulnerability remediation efforts for cloud-based applications and infrastructure.
- Hybrid Cloud Deployment: Deploy FedRAMP High hybrid cloud solutions, ensuring smooth integration of on-premises components.
- Incident Response & Threat Assessment: Assess and respond to security threats, vulnerabilities, and incidents, coordinating with appropriate teams for resolution.
Recruiter Submission Template:
Evaluation Benchmarks Self-Assessment (1-5) Experience (In years) Notes/Comments Must possess Azure Expertise:
Microsoft Azure Cloud experience (GovCloud preferred).
Familiarity with Azure security tools/platforms (e.g., Azure AD, Sentinel, Defender, Monitor, Key Vault). 5+ years of cyber-related experience in a commercial environment with Azure, focusing on technical information security and risk management. Must have experience with Security Proficiency: Identity Access and Management concepts (including multifactor authentication and SSO/Federation), Privileged Access, Vulnerability testing for Azure, Understanding of CI/CD pipelines and software Cloud Security Domains experience: Demonstrated expertise in Information Security and Risk Management across Windows and Linux Familiarity with key domains: Identity, Credential, and Access Management (ICAM), Authentication and Authorization (including SSO and Identity Federation), Zero-Trust, Defense-In-Depth, Governance and Compliance. Data Security, Operating System Security, Network Layer Protection, Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response, Cloud Core Platform (Compute, Storage, Networking).