skip to main content

Important Notice

It appears you are using an older version of your browser. While some functions will be available, IllinoisJobLink.com works best with a modern browser such as the ones provided by:

Please download and install the latest version of the browser of your choice. We apologize for any inconvenience.



Information Security Architect

Click the Facebook, Google+ or LinkedIn icons to share this job with your friends or contacts. Click the Twitter icon to tweet this job to your followers. Click the link button to view the URL of the job, which then can be copied and pasted into an e-mail or other document.

Job Details
Job Order Number
JC152045391
Company Name
Precise Solutions
Physical Address

Vernon Hills, IL 60061
Job Description

Precise Solutions is an Illinois BEP/FBE (female owned business enterprise) certified consulting company founded in 2000. Our mission is to provide companies with specialized resources that can drive their system portfolio projects using program management processes, change management and blended learning solutions. Please visit our website at www.precise-solutions.com

At Precise Solutions, we are looking for top talent consultants to bring on as employees of our organization and service our clients in the pharmaceutical and healthcare industries primarily located in the Northern Chicago Suburbs. We are much more than a consulting firm! Precise Solutions provides competitive compensation packages with great salaries, benefits, health insurance, paid time off and 401k. We currently have an immediate need for the following:

Job Title: Information Security Architect

Client: Pharmaceutical, TBA

Business Unit: Corporate-Information Technology (HQIT)

Location: Vernon Hills, Illinois

Pay Rate: $130- $140 pr. Hr. plus health, dental, vision insurance, 401k and PTO

The Information Security Architect is a member of the Information Security team and works closely with other members of the team to develop and implement a comprehensive information security program. This includes defining security policies, processes, and standards.

Major Duties and Responsibilities:

+ Develop plans for security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices.

+ Additionally, developing requirements for public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as Windows and Unix server infrastructure, messaging, end user computing devices, and software; adhering to industry standards.

+ Support security aspects of business & IT initiatives by assisting in architecture, design, implementation, deployment, and operational transition of innovative & secure technology solutions.

+ Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks in the infrastructure.

+ Research, evaluate, design, test, recommend and plan the implementation of new or updated information security technologies.

+ Establish collaborative working relations with the Information Technology functions to ensure that solutions align with security architecture and business strategy.

+ Play an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned. Complete remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed.

+ Evaluate security controls employed by Cloud service and other third party providers to ensure information assets are adequately protected.

+ Provides second- and third-level support and analysis during and after security incidents. Assists security administrators and IT staff in the resolution of reported security incidents.

+ Research and assess new information security threats and recommend remedial actions.

+ Foster an information security culture through education, skill development, and implementation of effective information security processes and practices.

+ Understand and adhere to corporate standards regarding applicable Corporate and Divisional Policies, including code of conduct, safety, GxP compliance, data security, and the software development lifecycle

+ May mentor/supervise a team of one or more and guide and evaluate the performance of those individuals; is accountable for the effective performance of the team/individuals.

+ Matures and leverages relationships with affiliates, subsidiaries, vendors, and industry peers in accordance with Client Values, Vendor Management Office, and Purchasing to further the mission, vision and goals of the organization.

Experience and Skills

+ 8+ years? work experience in information security and/or related functions (such as IT Audit, Risk Management or Security Architecture).

+ During recent history, candidate must have demonstrated exceptional ability to assess and communicate information security concepts and practices, with both business and IT stakeholders.

+ Requires in-depth knowledge of the systems development life cycle, client area?s functions and systems, and systems applications programs development technological alternatives.

+ Proven implementation of creative technology solutions that advance the business

+ Excellent written and oral English communication skills.

Specifically, we?re looking for:

+ Significant exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards.

+ Understanding the following concepts is a plus; identity management, federated identity services, incident management, access control, end-point protections, desktop security tools, anti-malware solutions, application vulnerability testing, public key infrastructure, Windows, and Unix/Linux.

+ Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project.

+ Signification SOX and HIPAA experience in dealing with IT general controls (ITGC), demonstrated through hands-on audit, remediation, and/or computer system validation. Excellent understanding of current Information Security & Architecture trends and their impact on business strategies including: key Information Security vendors and solutions, audit organizations and influential market research firms.

+ Excellent communications and influencing skills with strong ability to balance differing stakeholder interests through sound analysis and persuasion.

+ Strong people skills, collaborative ability to work with IT stakeholders inside and outside of the organization, able to mentor team members with diverse backgrounds.

+ Ability to formulate network security architecture vision and translate vision into execution.

+ Thorough understanding of Information Security frameworks and good practices (e.g. ISO, NIST), and proven ability to strike a balance between an academic and pragmatic approach.Requirements:

+ Relevant work experience is important for successful performance of this role due to the complexity of our global IT Security environment.

+ Information security qualification such as CISSP is preferred.

+ Recent work experience in a ?Big Four? focused in health care or Fortune 100 health care/life science organization is a plus.

Hiring Manager?s Notes

+ Position Title: Information Security Architect

+ Years of experience/education/certifcations required: 8+ years? work experience in information security and/or related functions

+ What are the top skills/requirements this person should have?

+ Significant exposure or understanding of the following concepts, practices, and technologies: network security and perimeter security, firewalls, IDS/IPS, SIEM, workstation, mobile device, and network design standards.

+ Understanding the following concepts is a plus; identity management, federated identity services, incident management, access control, end-point protections, desktop sec


To view full details and how to apply, please login or create a Job Seeker account.