Citizen
Full Time
Direct Hire
UG :- - Not Required
PG :- - Not Required
No of position :- ( 1 )
Post :- 11th Aug 2022
General Summary
A brief statement (3-5 sentences) describing the main purpose of the job and an overall summary or purpose of what it does. The intent of this statement is to describe why the job exists and what the incumbent is expected to accomplish.
The Cyber Security Architect position is a hybrid role combining key aspects of architecture and engineering. This position requires the selected candidate to possess business insight; technical acuity; and the ability to think, communicate and write at various levels of abstraction.
This position contributes to improving our Information Security program, through formal Information Security architecture processes that deliver consistent, optimal and resilient solutions that satisfy the business requirements for security services.
This position works on multiple projects as a security resource. This position assists on, helps plan, and carries out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.
This position works with the Cyber Security Architecture and the Information Security & Compliance teams. This position also works closely with enterprise architects and other functional architects to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently across the following areas:
Security infrastructure, program development and delivery
Security governance, policies, standards, guidelines, and procedures
Security infrastructure implementation, technology evaluation and solution recommendation
Security management for all threat and vulnerability solutions and guidelines
Primary/Key Responsibilities
List three to ten (3-10) statements that describe the major activities/essential functions for which this job is held accountable and rank the primary responsibilities in order from most important to least important. Please indicate the percent of time that will be spent on each responsibility (1% is the smallest time commitment and 100% is the largest time commitment). All percentages must add up to 100% in total. Each primary responsibility statement should be one to three sentences in length.
Primary Responsibility:
Percent of Time Spent on Task
(1-100%)
1. Serves as a security resource in application development, database design, network and/or platform (cloud, operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
25%
2. Works closely with enterprise architects, functional architects, and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently.
15%
3. Evaluates third party products and services to verify that they meet security standards and will integrate seamlessly and securely into the IT computing architecture.
10%
4. Ensures security architecture standards and solutions meet business objectives and regulatory compliance requirements.
10%
5. Implements or assists with complex security architecture project tasks including providing requirements for designing and implementing components of the Information Security program.
10%
6. Collaborates with external departments and vendors to provide consultation concerning Information Security architectures and the implementation and integration with existing network environments, applications, and services.
10%
7. Develops the business, information and technical artifacts that constitute the enterprise information security architecture and solutions.
5%
8. Supports and guides security administrators, analysts, project/program managers and liaisons regarding their compliance to standards.
5%
9. Research, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors.
5%
10. Contributes to the alignment of security governance with Enterprise Architecture (EA) governance and project and portfolio management (PPM).
5%
What typical decisions does this job have total authority for making?
What typical decisions does this job refer to others for approval?
What level associate (job title) provides work direction for this job?
What level associate (job title) reviews and approves work in progress or when completed?
Education & Experience
Minimum Requirements typically required for someone to be performing fully (competent) in this job:
Level of Formal Education:
Bachelor’s degree or master’s degree in computer science, information systems or other related field; or equivalent work experience.
Area of Study:
Computer Science, Information Management, Security, Compliance or Relevant Work Experience
Years of Experience:
8+
Type of Experience:
Special Certifications:
(CPA, Etc.)
Professional security management certification is desired, for example:
Or other similar information security credentials
Language Skills:
English
Technical Competencies:
Competencies:
Information Systems:
(People Soft, etc.)
Familiarity with various technologies (Cloud SaaS, PaaS, IaaS, On Premise, package, custom, etc.)
~~Immediate joiner will be preferred~~
Please share your profile nancy.pahuja@compucom.com
Nancy Pahuja:9911095636