Tech Evaluation Login
Tech Evaluation Signup
PasswordReset
Unsubscribe
PasswordReset
PasswordReset
PasswordReset
Register for Webinar
Register for Event
Job Channels
Skill Score
About Us
Contact Us
Our Blog
Toggle navigation
Home
Skill Score
DemandIndex
Jobs
FETCH Jobs
Java J2EE
Dot Net, C#
DBA
SAP
Admin, Networking
Datawarehousing
QA
Demo
Candidate
Recruiter
Services
Job Posting & Resume Access
Integrated Talent Sourcing
Sub Contractor Supply Chain
Merger & Acquisition
Candidate
Post Resume
Login
Create Job Alert
Recruiter
Login
Free Trial
Signup
Pricing
| Pricing
Dashboard
My Resumes
Resume List
Add Resume
Edit / Update Resume
My Jobs
Fetch Jobs
Matched Jobs
Applied Jobs
IT Security Architect
Midland, TX
Midland
TX
79701
Date
: Jul-23-24
2024-07-23
2025-07-23
IT Security Architect
Midland, TX
Jul-23-24
Work Authorization
US Citizen
GC
H1B
EAD (OPT/CPT/GC/H4)
Preferred Employment
Corp-Corp
W2-Permanent
W2-Contract
1099-Contract
Contract to Hire
Job Details
Experience
:
Architect
Rate/Salary ($)
:
USD 90 / Hourly / C2C
Duration
:
6 Months with extension
Sp. Area
:
QA, Testing Automation
Sp. Skills
:
Security; Penetration Testing
Consulting / Contract
CONTRACTOR
Required Skills
:
CISSP, Security, cism, giac
Preferred Skills
:
Domain
:
IT/Software
Work Authorization
US Citizen
GC
EAD (OPT/CPT/GC/H4)
H1B
Preferred Employment
Corp-Corp
W2-Permanent
W2-Contract
1099-Contract
Contract to Hire
Job Details
Experience
:
Architect
Rate/Salary ($)
:
USD 90 / Hourly / C2C
Duration
:
6 Months with extension
Sp. Area
:
QA, Testing Automation
Sp. Skills
:
Security; Penetration Testing
Consulting / Contract
CONTRACTOR
Required Skills
:
CISSP, Security, cism, giac
Preferred Skills
:
Domain
:
IT/Software
Intone Networks
Parlin, NJ
Post Resume to
View Contact Details &
Apply for Job
Job Description
:
Job Title: IT Security Architect
Location: Midland, Texas
Duration: 6+ months
Key areas needed:
Bachelor's degree in Computer Science, Information Technology, or a related field.
Extensive knowledge of security technologies, including firewalls, intrusion detection and prevention systems, and encryption.
Experience with security risk assessments, vulnerability assessments, and threat modeling
Knowledge of industry regulations and compliance standards, such as TSA Pipeline refs, GDPR, NIST 800-53/CSF, HIPAA, and ISO 27001.
Professional certifications, such as CISSP, CISM, or SANS GIAC, are highly desirable.
Intermediate knowledge of cloud security products as part of a cloud strategy
Advanced understanding Cloud best practices on leveraging the capabilities to secure by design
Application Security with Application Development background is highly encouraged
Awareness of ZeroTrust methodologies
Turn OFF keyword highlights