Avangrid Cyber Systems Architect in Augusta, Maine
Cyber Systems Architect
Company: AVANGRID SERVICE COMPANY
Augusta, ME, US
About AVANGRID: AVANGRID, Inc. (NYSE: AGR) aspires to be the leading sustainable energy company in the United States. Headquartered in Orange, CT with approximately $40 billion in assets and operations in 24 U.S. states, AVANGRID has two primary lines of business: Avangrid Networks and Avangrid Renewables. Avangrid Networks owns eight electric and natural gas utilities, serving more than 3.3 million customers in New York and New England. Avangrid Renewables owns and operates a portfolio of renewable energy generation facilities across the United States. AVANGRID employs approximately 7,000 people and has been recognized by Forbes and Just Capital as one of the 2021 JUST 100 companies - a list of America's best corporate citizens - and was ranked number one within the utility sector for its commitment to the environment and the communities it serves. The company supports the U.N.’s Sustainable Development Goals and was named among the World’s Most Ethical Companies in 2021 for the third consecutive year by the Ethisphere Institute. For more information, visit www.avangrid.com (https://www.avangrid.com/wps/portal/avangrid/home)
Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.
Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
• Computer networking concepts and protocols (especially OT), and network security methodologies.
• Familiarity with laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
• Cyber threats and vulnerabilities.
• Database systems.
• Knowledge of installation, integration, and optimization of system components.
• Knowledge of Security Assessment and Authorization process.
• Knowledge of industry-standard and organizationally accepted analysis principles and methods.
• Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
• Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis).
• Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
• Knowledge of operating systems.
• Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
• Knowledge of parallel and distributed computing concepts.
• Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
• Knowledge of security system design tools, methods, and techniques.
• Knowledge of software engineering.
• Knowledge of systems testing and evaluation methods.
• Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
• Knowledge of the systems engineering process.
• Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
• Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
• Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
• Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
• Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
• Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
• Knowledge of circuit analysis.
• Knowledge of confidentiality, integrity, and availability requirements.
• Knowledge of cybersecurity-enabled software products.
• Knowledge of the Risk Management Framework Assessment Methodology.
• Knowledge of various types of computer architectures.
• Knowledge of multi-level security systems and cross domain solutions.
• Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements).
• Knowledge of configuration management techniques.
• Knowledge of N-tiered typologies (e.g. including server and client operating systems).
• Knowledge of an organization's information classification program and procedures for information compromise.
• Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
• Knowledge of integrating the organization’s goals and objectives into the architecture.
• Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
• Knowledge of embedded systems.
• Knowledge of system fault tolerance methodologies.
• Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
• Knowledge of demilitarized zones.
• Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
• Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
• Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
• Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
Skills and Requirements
Skill in applying and incorporating information technologies into proposed solutions.
Skill in designing the integration of hardware and software solutions.
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Skill in design modeling and building use cases (e.g., unified modeling language).
Skill in writing code in a currently supported programming language (e.g., Java, C++).
Skill in the use of design methods.
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
Ability to apply an organization's goals and objectives to develop and maintain architecture.
Ability to optimize systems to meet enterprise performance requirements.
Ability to execute technology integration processes.
Ability to build architectures and frameworks.
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.
Be a role model
Collaborate and Share
Develop Self & Others
Empower to grow
Focus to achieve results
Please note that any applicant who is not a citizen of the country of the vacancy will be subject to compliance with the applicable immigration requirements to legally work in that country
Avangrid employees may be assigned a system emergency role and in the event of a system emergency, may be required to work outside of their regular schedule/job duties. This is applicable to employees that will work in Connecticut, Maine, Massachusetts, and New York within AVANGRD Network and Corporate functions. This does not include those that will work for Avangrid Renewables
AVANGRID’s employment practices and policies are geared to hiring a diverse workforce and sustaining an inclusive culture. At AVANGRID we provide fair and equal employment and advancement opportunities for all employees and candidates regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status, disability, protected veteran status or any other status protected by federal, state, or local law. Learn more about equal employment by following this link (https://www.eeoc.gov/employers/upload/poster_screen_reader_optimized.pdf)
If you are an individual with a disability or a disabled veteran who is unable to use our online tool to search for or to apply for jobs, you may request a reasonable accommodation by contacting our Human Resources department at 203-499-2777 or firstname.lastname@example.org