

Need IT Security Architect 4 - State of Virginia
β - Featured Role | Apply direct with Data Freelance Hub
This role is for an IT Security Architect 4 with a contract length of "unknown" and a pay rate of "unknown." Located in Richmond, Virginia (Hybrid), it requires 7+ years in security best practices, risk analysis, and compliance, along with relevant certifications.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
May 31, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Hybrid
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Richmond, VA
-
π§ - Skills detailed
#Vulnerability Management #Cloud #Compliance #Base #Databases #Data Security #Monitoring #Risk Analysis #Cybersecurity #IAM (Identity and Access Management) #Documentation #Visualization #Firewalls #Leadership #Data Quality #SharePoint #Security
Role description
Hope you're doing well. We have an open position for a IT Security Architect 4. Pl. see the details below and let me know your interest. If interested, pl. Share a copy of your resume to hr@vinsysinfo.com along with your salary / rate expectations and the best time to reach you.
Role : IT Security Architect 4
Client : VDOT State of Virginia
Location: Richmond, Virginia (Hybrid); Need candidate within 2hrs drivable distance
Job ID: 764479
Interview Mode: Web Cam Interview Only
About The Role
The Virginia Department of Transportation's Information Technology Division is seeking a Senior Security Architect to serve the VDOT leadership in the domains of Application, Data and Technology Security through the development of architecture patterns, briefs, reports, and targeted security risk analyses.
Responsibilities
β’ Design/Institutionalize Enterprise Security/technology Patterns
β’ Assist teams on initiatives, providing tactical and architectural considerations on legacy solutions
β’ Evaluate new implementations while navigating a complex organizational environment with diverse stakeholders to accurately present the scenario, and present sound analyses and recommendations with steps for approval and implementation
β’ Manage a body of work independently, leveraging available process documentation, templates, systems and resources.
β’ Assist in issue resolution, communicating concerns effectively to the right personnel, operationalizing Security Architecture practices and extending the scope of ITD Governance & Security Architecture.
β’ Create and socialize clear, impactful and polished architecture artifacts, such as:
β’ Standards and guidelines
β’ Management Briefs
β’ Security Training
β’ Updated processes
β’ Knowledge Base articles
β’ PowerPoints
β’ Visio Process Diagrams
β’ PowerBI Dashboards
β’ Excel Reports
β’ Collaborate with Business areas and cross- functional Enterprise Architects to fully understand business needs and provide strategic consultation on data security and risk-averse implementation.
β’ Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and exception documentation.
β’ Support Vulnerability Management by ensuring VM data quality and ingestion for remediation team execution.
β’ Integrate Security into Architecture Roadmaps by developing artifacts and ensuring other architectsβ roadmaps contain integral security measures and best practices.
β’ Research and share findings of architecture governance, controls, and peer review processes and projects with regards to platform technology, security, and cloud.
β’ Document process diagrams and script narratives/executive summaries.
β’ Create Business focused documentation for diverse technical audiences.
β’ Research and provide written guidance on alignment with security policies/standards.
β’ Partner with architects, other technical team members and to develop roadmaps and strategies to support agency KPIs
Qualifications
β’ State/Industry experience in information security and IT risk management with a focus on security, performance, and reliability.
β’ Federal/State compliance & standards alignment experience reviewing proposed changes for programs and projects.
β’ Policy Development experience, utilizing, and presentation of information security architecture policies, standards and procedures
β’ Monitoring information security compliance experience with information security architecture policies and standards.
β’ Information security framework experience like NIST 800 Series, CSF & COBIT.
β’ Substantial technical expertise in at least two areas:
β’ Cloud technologies
β’ Identity & access management (IAM)
β’ Vulnerability Management
β’ Firewalls
β’ Computer Forensic Techniques
β’ Databases
β’ Collaboration Tools
β’ Web & Mail Services
β’ Security direction and design inputs experience with information security capabilities, and strategic technology alternatives.
β’ Communication & collaboration experience with excellent written and oral communication and presentation skills, and the ability to simplify technical terms and collaborate with diverse personnel.
β’ Demonstrated experience working with a broad cross-section of personal including all levels of management and external entities such as VITA consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with the Office of Information Security
β’ Fast-Paced environment experience with experience acquiring new skills/knowledge to meet customer needs.
β’ Customer perspective experience understanding IT customersβ priorities and the business criticality of platforms, applications and services.
Skill
Required / Desired
Amount
Experience
Knowledge and application of security best practices
Required 7 Years
Demonstrated experience creating executive-facing security recommendations
Required 7 Years
Knowledge of IT Governance and Compliance
Required 3 Years
Experience in business writing and presenting
Required 3 Years
Educational or Career Experience in Cybersecurity, Government technology implementation, IT Governance or related field(s).
Required 4 Years
Demonstrate experience in Risk-Based analysis
Required 7 Years
Experience in Process Modeling (Visio)
Required 3 Years
PowerBI β Experience in Data Visualization & Reports
Desired 3 Years
SharePoint β Organizing, sharing and retrieving resources
Desired 3 Years
Question 1 Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the Virginia for the duration of the assignment?
Question 2
Please list candidate's email address.
Hope you're doing well. We have an open position for a IT Security Architect 4. Pl. see the details below and let me know your interest. If interested, pl. Share a copy of your resume to hr@vinsysinfo.com along with your salary / rate expectations and the best time to reach you.
Role : IT Security Architect 4
Client : VDOT State of Virginia
Location: Richmond, Virginia (Hybrid); Need candidate within 2hrs drivable distance
Job ID: 764479
Interview Mode: Web Cam Interview Only
About The Role
The Virginia Department of Transportation's Information Technology Division is seeking a Senior Security Architect to serve the VDOT leadership in the domains of Application, Data and Technology Security through the development of architecture patterns, briefs, reports, and targeted security risk analyses.
Responsibilities
β’ Design/Institutionalize Enterprise Security/technology Patterns
β’ Assist teams on initiatives, providing tactical and architectural considerations on legacy solutions
β’ Evaluate new implementations while navigating a complex organizational environment with diverse stakeholders to accurately present the scenario, and present sound analyses and recommendations with steps for approval and implementation
β’ Manage a body of work independently, leveraging available process documentation, templates, systems and resources.
β’ Assist in issue resolution, communicating concerns effectively to the right personnel, operationalizing Security Architecture practices and extending the scope of ITD Governance & Security Architecture.
β’ Create and socialize clear, impactful and polished architecture artifacts, such as:
β’ Standards and guidelines
β’ Management Briefs
β’ Security Training
β’ Updated processes
β’ Knowledge Base articles
β’ PowerPoints
β’ Visio Process Diagrams
β’ PowerBI Dashboards
β’ Excel Reports
β’ Collaborate with Business areas and cross- functional Enterprise Architects to fully understand business needs and provide strategic consultation on data security and risk-averse implementation.
β’ Perform tasks related to Security Compliance and Control Evaluation, Risk analysis, and exception documentation.
β’ Support Vulnerability Management by ensuring VM data quality and ingestion for remediation team execution.
β’ Integrate Security into Architecture Roadmaps by developing artifacts and ensuring other architectsβ roadmaps contain integral security measures and best practices.
β’ Research and share findings of architecture governance, controls, and peer review processes and projects with regards to platform technology, security, and cloud.
β’ Document process diagrams and script narratives/executive summaries.
β’ Create Business focused documentation for diverse technical audiences.
β’ Research and provide written guidance on alignment with security policies/standards.
β’ Partner with architects, other technical team members and to develop roadmaps and strategies to support agency KPIs
Qualifications
β’ State/Industry experience in information security and IT risk management with a focus on security, performance, and reliability.
β’ Federal/State compliance & standards alignment experience reviewing proposed changes for programs and projects.
β’ Policy Development experience, utilizing, and presentation of information security architecture policies, standards and procedures
β’ Monitoring information security compliance experience with information security architecture policies and standards.
β’ Information security framework experience like NIST 800 Series, CSF & COBIT.
β’ Substantial technical expertise in at least two areas:
β’ Cloud technologies
β’ Identity & access management (IAM)
β’ Vulnerability Management
β’ Firewalls
β’ Computer Forensic Techniques
β’ Databases
β’ Collaboration Tools
β’ Web & Mail Services
β’ Security direction and design inputs experience with information security capabilities, and strategic technology alternatives.
β’ Communication & collaboration experience with excellent written and oral communication and presentation skills, and the ability to simplify technical terms and collaborate with diverse personnel.
β’ Demonstrated experience working with a broad cross-section of personal including all levels of management and external entities such as VITA consultants and service providers to explain and security measures and collaborate and disseminate security related information in partnership with the Office of Information Security
β’ Fast-Paced environment experience with experience acquiring new skills/knowledge to meet customer needs.
β’ Customer perspective experience understanding IT customersβ priorities and the business criticality of platforms, applications and services.
Skill
Required / Desired
Amount
Experience
Knowledge and application of security best practices
Required 7 Years
Demonstrated experience creating executive-facing security recommendations
Required 7 Years
Knowledge of IT Governance and Compliance
Required 3 Years
Experience in business writing and presenting
Required 3 Years
Educational or Career Experience in Cybersecurity, Government technology implementation, IT Governance or related field(s).
Required 4 Years
Demonstrate experience in Risk-Based analysis
Required 7 Years
Experience in Process Modeling (Visio)
Required 3 Years
PowerBI β Experience in Data Visualization & Reports
Desired 3 Years
SharePoint β Organizing, sharing and retrieving resources
Desired 3 Years
Question 1 Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the Virginia for the duration of the assignment?
Question 2
Please list candidate's email address.