- Serves as a security expert in network design, database design, platform security (cloud, operating system) efforts, helping project teams comply
with enterprise and IT security policies, industry regulations, and best practices.
- Ensures security architecture standards and solutions meet business objectives and regulatory compliance requirements
- Interfaces with external departments and vendors to provide expert-level consultation concerning Information Security architectures and the
implementation and integration with existing network environments, applications, and services.
- Evaluates third party products and services to verify that they meet security standards and will integrate seamlessly and securely into the IT computing architecture
- Assist with designing and developing security policies, standards, and procedures e.g., firewall management, SSL/IPSec, security incident and
event management (SIEM), data protection (DLP, encryption), user account management (SSO, SAML), and password/key management
- Contributes to the alignment of security governance with Enterprise Architecture (EA) governance and project and portfolio management (PPM)
- Develops the business, information, and technical artifacts that constitute the enterprise information security architecture and solutions
- Implements complex security architecture project tasks including providing requirements for designing and implementing components of the
Information Security program
- Research, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise
- and its customers, business partners, and vendors
- Assists with the Threat Vulnerability Management Process
- Contributes to the alignment of security governance with Enterprise Architecture (EA) governance and project and portfolio management (PPM)
Job Qualifications
These were also from the job description and re-ordere