Security Solutions Architect/Developer Business Overview:Corporate Investigations provides investigative leadership and expertise in the handling of Computer Investigations, Computer Forensics, Cyber Incident Response, Fraud Detections and Electronic Discovery/Litigation Support matters. Position Description:The Security Solutions Architect -will play a pivotal role in designing and implementing a data modeling solution that will aid in the identification and detection of risk associated anomalies. He/She will participate in ongoing program activities as well as play a key role in continued development and strategic planning. The successful individual manages and conducts all facets of criminal and non-criminal investigations, with a focus on investigations related to computer technology. Critical and analytical thinking are both necessary in order to present information that leads to accurate conclusions and cuts through various investigative complexities. Regularly provides significant forensic support for complex external and internal investigations globally. Primary Responsibilities:Conducts analysis for process improvement initiatives Participate in interviews of sponsors and business partners to understand project objectives, use cases and requirements to help define scope Diagrams business processes and system workflows targeting areas of improvement Evaluates design of existing systems and processes to judge their functionality, effectiveness, reliability, performance, usage and maintainability Recommends changes to existing systems design and processes to achieve requirements Maintains objectives, requirements, use cases and specifications so they remain correct Conduct code reviews Perform proactive program risk assessments to include defining the requirements and implementing solutions and monitoring – facilitate ongoing adherence Serve as subject matter expert for program infrastructure and system interrelationsQualifications: Education and Experience:Full project life cycle experience, solid seasoned knowledge of project management methodologies 8+ years of work experienceBachelor’s degree preferred Working knowledge of large enterprise security and risk systems a plusSkills and Knowledge:Strong knowledge of network architecture Strong knowledge of Data base architecture Strong knowledge of system interrelations/integration Strong knowledge of systems design Strong understanding of data mining concepts, data correlation and trending concepts Experience with data modeling Experience with artificial intelligence and/or inference engines Familiarity with anomaly detection systems a plus Perl, C++, Strong analytical skills and proven track record on complex projects/programs Demonstrated ability to balance and prioritize simultaneous projects/program facets Strong judgment, decision making, and ability to assess and manage risk Mature problem analysis and issue management techniques Superior communication, customer service, analytical and change management skills Strong interpersonal skills, ability to work well with diverse groups Proven ability to effectively manage your timeJob Location is Boston, MA – company is offering a relocation for the right candidate. If you are interested in this opportunity then please contact: David Dupuy Jr.OS3 Staffing, LLC(617) 799-6316 dave@os3staffing.com Related content feature What it takes to be a malware analyst The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response. By Bob Violino Jun 15, 2017 7 mins Careers IT Leadership Security news New CISO Chris McDaniels to help drive Mosaic451’s cybersecurity practice The US Air Force veteran brings deep experience in cyber defense and emergency response. By Michael Nadeau May 23, 2017 2 mins IT Leadership Security news Veristor hires Jackie Groark as director, security/CISO Groark, an expert in threat detection and intelligence, will lead the company’s security practice. By Michael Nadeau May 17, 2017 2 mins IT Leadership Security news BJC names Matthew Modica as its first chief information security officer Modica will be responsible for all levels of security, from operations to IT to facilities. By Michael Nadeau May 15, 2017 1 min IT Leadership Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe