

Aditi Consulting
Data Security Admin
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Data Security Admin with a contract length of over 6 months, offering a pay rate of $58.00-$60.00/hr. Required skills include expertise in NIST CSF, ISO 27001, cloud infrastructure, and cybersecurity certifications like CISSP or CCSP.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
480
-
🗓️ - Date
April 17, 2026
🕒 - Duration
More than 6 months
-
🏝️ - Location
Hybrid
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
East Peoria, IL
-
🧠 - Skills detailed
#Data Security #Network Security #Firewalls #REST (Representational State Transfer) #Risk Analysis #Compliance #"ETL (Extract #Transform #Load)" #Leadership #Consulting #Cloud #Automation #DevOps #Security #SaaS (Software as a Service) #Base #Vault #AI (Artificial Intelligence) #Azure DevOps #Azure #Cybersecurity
Role description
Payrate: $58.00- $60.00/hr.
Typical task breakdown:
Review and assess architectural artifacts (e.g. architecture diagrams) to follow security policies & controls, identification of risks and potential areas of improvement and documenting the risks/control gaps.
Collaborate with peer Cybersecurity professional in the assessment of IT solution for security posture
Responsibilities:
• Perform security Architectural reviews of IT applications to ensure they are resilient by design, focusing on hybrid architecture and large-scale SaaS integrations.
• Perform assessment of architectural artifacts (e.g. architecture diagrams) for compliance with security policies, identification of risks and potential areas of improvement
• Design and validate secure integration patterns for multiple large-scale SaaS platforms within our hybrid environment.
• Leverage your background in IT network support to ensure application traffic flows are secured via proper segmentation and zero-trust principles.
• Conduct cybersecurity risk assessments to identify potential vulnerabilities and work with business to implement strategies to mitigate risks.
• Utilize tools like ServiceNow and Azure DevOps for workflow automation, ticketing, and project tracking.
Requirements:
• Proven expertise applying industry standards including NIST CSF, ISO 27001, and OWASP principles to enterprise solution designs and security control mapping.
• Deep technical understanding of Cloud (Virtual Networks, NSGs, Private Links) and on-premises infrastructure (firewalls, DMZs) to evaluate boundary protection and data flow security
• Proficiency in performing Threat and Risk Analysis (TRA) and threat modeling to proactively identify and mitigate application-level risks early in the development lifecycle.
• Ability to audit system designs against architectural patterns like Zero Trust, Micro-segmentation, and Defense-in-Depth to identify single points of failure or insecure trust boundaries.
• Deep understanding of secure identity management, least privilege enforcement, and designing authentication/authorization patterns for connected systems
• Knowledge of implementing and reviewing Encryption at Rest (AES-256, Key Vault/HSM management) and Encryption in Transit (TLS 1.2+, mTLS) within complex application architectures.
• Skill in analyzing application entry points—such as Public IPs, Load Balancers, and Edge Gateways—to minimize the attack surface and ensure proper traffic inspection.
• Ability to interpret and critique complex network diagrams and data flow maps to pinpoint architectural vulnerabilities.
• Prior role as a Network Security Architect/Engineer would be preferred
Skills:
• Verbal and written communication skills, problem solving skills, customer service and interpersonal skills.
• Expert ability to work independently and manage one’s time.
• Expert leadership and mentoring skills necessary to provide support and constructive performance feedback.
Education & Experience Required:
• Associates degree required in IT or related field, bachelor’s degree preferred.
• 8+ years of hands-on IT Architect, including 2-3 years in a cybersecurity; if the candidate is ROCKSTAR and has right under 8 years, go ahead and submit them.
• Prior experience/roles include IT Architect, Cloud Architect would be ideal
• Cybersecurity Certifications such as CISSP, CCSP, GIAC cert.
• Those with P.H.D.’s are likely overqualified
• Persons with prior roles exclusively in Security & Vulnerability Operations, Incident Response, GRC organizations - would not be ideal candidates
Pay Transparency: The typical base pay for this role across the U.S. is: $58.00- $60.00/hour. Non-exempt positions are eligible for overtime at a rate of 1.5 times the base hourly rate for all hours worked in excess of 40 in a work week, or as required by state or local law. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience. Full-time employees are eligible to select from different benefits packages. Packages may include medical, denmatch, lifeion benefits, health savings accounts with qualified medical plan enrollment, 10 paid days off, 3 days paid bereavement leave, 401(k) plan participation with employer match, life and disability insurance, commuter benefits, dependent care flexible spending account, accident insurance, critical illness insurance, hospital indemnity insurance, accommodations and reimbursement for work travel, and discretionary performance or recognition bonus. Sick leave and mobile phone reimbursement provided based on state or local law.
Consent to Communication and Use of AI Technology: By submitting your application for this position and providing your email address(es) and/or phone number(s), you consent to receive text (SMS), email, and/or voice communication whether automated (including auto telephone dialing systems or automatic text messaging systems), pre-recorded, AI-assisted, or individually initiated from Aditi Consulting, our agents, representatives, or affiliates at the phone number and/or email address you have provided. These communications may include information about potential opportunities and information. Message and data rates may apply. Message frequency may vary.
You represent and warrant that the email address(es) and/or telephone number(s) you provided to us belong to you and that you are permitted to receive calls, text (SMS) messages, and/or emails at these contacts. You also acknowledge and agree to Aditi Consulting LLC’s use of AI technology during the sourcing process, including calls from an AI Voice Recruiter. AI is used solely to gather data and does not replace human-based decision-making in employment decisions. Calls may be recorded.
Consent is not a condition of purchasing any property, goods, or services. You may revoke your consent at any time by replying “STOP” to messages or by contacting privacy@aditiconsulting.com.
For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy .
#AditiConsulting
#26-02355
Payrate: $58.00- $60.00/hr.
Typical task breakdown:
Review and assess architectural artifacts (e.g. architecture diagrams) to follow security policies & controls, identification of risks and potential areas of improvement and documenting the risks/control gaps.
Collaborate with peer Cybersecurity professional in the assessment of IT solution for security posture
Responsibilities:
• Perform security Architectural reviews of IT applications to ensure they are resilient by design, focusing on hybrid architecture and large-scale SaaS integrations.
• Perform assessment of architectural artifacts (e.g. architecture diagrams) for compliance with security policies, identification of risks and potential areas of improvement
• Design and validate secure integration patterns for multiple large-scale SaaS platforms within our hybrid environment.
• Leverage your background in IT network support to ensure application traffic flows are secured via proper segmentation and zero-trust principles.
• Conduct cybersecurity risk assessments to identify potential vulnerabilities and work with business to implement strategies to mitigate risks.
• Utilize tools like ServiceNow and Azure DevOps for workflow automation, ticketing, and project tracking.
Requirements:
• Proven expertise applying industry standards including NIST CSF, ISO 27001, and OWASP principles to enterprise solution designs and security control mapping.
• Deep technical understanding of Cloud (Virtual Networks, NSGs, Private Links) and on-premises infrastructure (firewalls, DMZs) to evaluate boundary protection and data flow security
• Proficiency in performing Threat and Risk Analysis (TRA) and threat modeling to proactively identify and mitigate application-level risks early in the development lifecycle.
• Ability to audit system designs against architectural patterns like Zero Trust, Micro-segmentation, and Defense-in-Depth to identify single points of failure or insecure trust boundaries.
• Deep understanding of secure identity management, least privilege enforcement, and designing authentication/authorization patterns for connected systems
• Knowledge of implementing and reviewing Encryption at Rest (AES-256, Key Vault/HSM management) and Encryption in Transit (TLS 1.2+, mTLS) within complex application architectures.
• Skill in analyzing application entry points—such as Public IPs, Load Balancers, and Edge Gateways—to minimize the attack surface and ensure proper traffic inspection.
• Ability to interpret and critique complex network diagrams and data flow maps to pinpoint architectural vulnerabilities.
• Prior role as a Network Security Architect/Engineer would be preferred
Skills:
• Verbal and written communication skills, problem solving skills, customer service and interpersonal skills.
• Expert ability to work independently and manage one’s time.
• Expert leadership and mentoring skills necessary to provide support and constructive performance feedback.
Education & Experience Required:
• Associates degree required in IT or related field, bachelor’s degree preferred.
• 8+ years of hands-on IT Architect, including 2-3 years in a cybersecurity; if the candidate is ROCKSTAR and has right under 8 years, go ahead and submit them.
• Prior experience/roles include IT Architect, Cloud Architect would be ideal
• Cybersecurity Certifications such as CISSP, CCSP, GIAC cert.
• Those with P.H.D.’s are likely overqualified
• Persons with prior roles exclusively in Security & Vulnerability Operations, Incident Response, GRC organizations - would not be ideal candidates
Pay Transparency: The typical base pay for this role across the U.S. is: $58.00- $60.00/hour. Non-exempt positions are eligible for overtime at a rate of 1.5 times the base hourly rate for all hours worked in excess of 40 in a work week, or as required by state or local law. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience. Full-time employees are eligible to select from different benefits packages. Packages may include medical, denmatch, lifeion benefits, health savings accounts with qualified medical plan enrollment, 10 paid days off, 3 days paid bereavement leave, 401(k) plan participation with employer match, life and disability insurance, commuter benefits, dependent care flexible spending account, accident insurance, critical illness insurance, hospital indemnity insurance, accommodations and reimbursement for work travel, and discretionary performance or recognition bonus. Sick leave and mobile phone reimbursement provided based on state or local law.
Consent to Communication and Use of AI Technology: By submitting your application for this position and providing your email address(es) and/or phone number(s), you consent to receive text (SMS), email, and/or voice communication whether automated (including auto telephone dialing systems or automatic text messaging systems), pre-recorded, AI-assisted, or individually initiated from Aditi Consulting, our agents, representatives, or affiliates at the phone number and/or email address you have provided. These communications may include information about potential opportunities and information. Message and data rates may apply. Message frequency may vary.
You represent and warrant that the email address(es) and/or telephone number(s) you provided to us belong to you and that you are permitted to receive calls, text (SMS) messages, and/or emails at these contacts. You also acknowledge and agree to Aditi Consulting LLC’s use of AI technology during the sourcing process, including calls from an AI Voice Recruiter. AI is used solely to gather data and does not replace human-based decision-making in employment decisions. Calls may be recorded.
Consent is not a condition of purchasing any property, goods, or services. You may revoke your consent at any time by replying “STOP” to messages or by contacting privacy@aditiconsulting.com.
For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy .
#AditiConsulting
#26-02355






