Required Skills

Cloud Security Architect

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 26th Jun 2025

JOB DETAIL

·  Identify and recommend relevant cybersecurity policies, standards, procedures, and guardrails.

·  Drive the definition of cybersecurity guidelines across the product and enterprise architecture group by leading working groups focused on cybersecurity.

·  Develop secure design patterns in conjunction with the product and enterprise architecture group based on standards that can be adopted and implemented by engineering teams.

·  Contribute to the development of non-cyber architecture-related governance patterns, policies, and standards.

·  Provides complex analysis of potential risks to information systems' security and recommends innovative solutions.

·  Work with cross-functional technical, development and delivery teams to ensure the application of smooth, efficient and scalable release processes.

·  Engage with business teams and engineering teams to define cybersecurity guardrails that promote efficient and seamless adoption of secure design patterns.

·  Participate in security events and incident response to identify gaps in current design and propose solutions to prevent threats from reoccurring.

·  Research and evaluate emerging security trends, threats, and technologies, and recommend appropriate solutions and enhancements.

·  Collaborate with data users, software and other technical stakeholders to ensure security considerations are factored into and underpin development and operational decision making.

·  Collaborate with cybersecurity peers to incorporate vulnerability management, governance, risk and compliance, cyber defense, continuous controls monitoring, and identity governance into cybersecurity standards as a cohesive cybersecurity organization

Company Information