Data architect

Job : Data architect 

Location(s): CT, ME, NY

Contract : 1 year

Develops data architecture concepts and works on the capabilities phases of the network and systems life cycle; translates technology and environmental conditions (e.g., law and regulation) into secure data flow control data-at-rest designs and processes.

Ensures that the stakeholder data security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of cyber architecture including reference models, segment and solution architectures, and the resulting networks and systems supporting those missions and business processes.

JOB REQUIREMENTS:

Education Required:

  • BA/BS degree in Computer Science, Engineering, Business, or related field
  • 5 years in Operational Technology Security
  • 10 years of OT/IT/Enterprise architecture and program implementation experience

 

Experience Required:

·         Data concepts and protocols (especially OT), and system and network data security methodologies.

·         Knowledge of key concepts in data security management (e.g., Release Management, Patch Management).

·         Knowledge of data security system design tools, methods, and techniques.

·         Knowledge of data systems testing and evaluation methods.

·         Database systems.

·         Knowledge of critical infrastructure data systems with information communication technology that were designed without system security considerations and develop security strategy.

·         Knowledge of data security architecture concepts including protocols, components, and principles (e.g., application of defense-in-depth).

·         Knowledge of data system management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

·         Knowledge of various types of data architectures.

·         Knowledge of multi-level data security systems and cross domain solutions.

·         Knowledge of data design processes, to include understanding of security objectives, operational objectives, and trade-offs.

 


 

Experience Desired

·         Familiarity with laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.

·         Cyber threats and vulnerabilities.

·         Knowledge of installation, integration, and optimization of data components.

·         Knowledge of industry-standard and organizationally accepted analysis principles and methods.

·         Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

·         Knowledge of operating systems.

·         Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

·         Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

·         Knowledge of confidentiality, integrity, and availability requirements.

·         Knowledge of an organization’s information classification program and procedures for information compromise.

·         Knowledge of data architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)

·         Knowledge of integrating the organization’s goals and objectives into data architecture.

·         Knowledge of system fault tolerance methodologies.

·         Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).


 

Responsibilities

·         Architect the integration of hardware and software solutions for all things data.

·         Develop use cases and other documentation (e.g., unified modeling language).

·         Apply cybersecurity and privacy principles to organizational data requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

·         Identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.

·         Apply best-practice methods, standards, and approaches for describing, analyzing, and documenting an organization’s data architecture. 

·         Build data architectures and frameworks.

·         Define and prioritize essential data system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.

·         Define appropriate levels of availability based on critical system functions and ensure that data requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.

·         Develop/integrate cybersecurity designs for data systems and networks with multilevel security requirements.

·         Document and address organization’s data architecture requirements throughout full life cycle.

·         Ensure that acquired or developed data architectures are consistent with organization’s cybersecurity architecture guidelines.

·         Perform security reviews, identify gaps in data architectures, and support development of security risk management plan.

·         Provide input on data security requirements to be included in statements of work and other appropriate procurement documents.

·         Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

·         Define and document how the implementation of a new data systems or new interfaces between systems impacts the security posture of the current environment.

·         Analyze candidate data architectures, allocate security services, and select security mechanisms.

·         Evaluate data architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements.

·         Write detailed functional specifications that document data architecture requirements.

·         Analyze user needs and requirements to plan data architecture.

·         Document and update as necessary all data definition and architecture activities.

·         Determine the protection needs (i.e., security controls) for the data system(s) and network(s) and document appropriately.

Rahul 

REDDAIAH, INC.

140 Metro Park, Suite 7A,Rochester, NY, 14623


About Author

JOHN KARY graduated from Princeton University in New Jersey and backed by over a decade, I am Digital marketing manager and voyage content writer with publishing and marketing excellency, I specialize in providing a wide range of writing services. My expertise encompasses creating engaging and informative blog posts and articles.
I am committed to delivering high-quality, impactful content that drives results. Let's work together to bring your content vision to life.

Leave a Reply

Your email address will not be published. Required fields are marked *