Required Skills

Cyber Security Cloud Architecture Network Security Data Security architect Identity & Access Mgmt

Work Authorization

  • Citizen

Preferred Employment

  • Full Time

Employment Type

  • Direct Hire

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 11th Aug 2022

JOB DETAIL

General Summary

A brief statement (3-5 sentences) describing the main purpose of the job and an overall summary or purpose of what it does. The intent of this statement is to describe why the job exists and what the incumbent is expected to accomplish.

 

The Cyber Security Architect position is a hybrid role combining key aspects of architecture and engineering. This position requires the selected candidate to possess business insight; technical acuity; and the ability to think, communicate and write at various levels of abstraction.

This position contributes to improving our Information Security program, through formal Information Security architecture processes that deliver consistent, optimal and resilient solutions that satisfy the business requirements for security services.

This position works on multiple projects as a security resource. This position assists on, helps plan, and carries out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.

This position works with the Cyber Security Architecture and the Information Security & Compliance teams. This position also works closely with enterprise architects and other functional architects to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently across the following areas:

Security infrastructure, program development and delivery

Security governance, policies, standards, guidelines, and procedures

Security infrastructure implementation, technology evaluation and solution recommendation

Security management for all threat and vulnerability solutions and guidelines

Primary/Key Responsibilities

List three to ten (3-10) statements that describe the major activities/essential functions for which this job is held accountable and rank the primary responsibilities in order from most important to least important. Please indicate the percent of time that will be spent on each responsibility (1% is the smallest time commitment and 100% is the largest time commitment). All percentages must add up to 100% in total. Each primary responsibility statement should be one to three sentences in length.

  • List the activity and how it is done. Use action verbs.
  • State what end results the activity is to accomplish.

Primary Responsibility:

Percent of Time Spent on Task

(1-100%)

1. Serves as a security resource in application development, database design, network and/or platform (cloud, operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices

25%

2. Works closely with enterprise architects, functional architects, and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently.

15%

3. Evaluates third party products and services to verify that they meet security standards and will integrate seamlessly and securely into the IT computing architecture.

10%

4. Ensures security architecture standards and solutions meet business objectives and regulatory compliance requirements.

10%

5. Implements or assists with complex security architecture project tasks including providing requirements for designing and implementing components of the Information Security program.

10%

6. Collaborates with external departments and vendors to provide consultation concerning Information Security architectures and the implementation and integration with existing network environments, applications, and services.

10%

7. Develops the business, information and technical artifacts that constitute the enterprise information security architecture and solutions.

5%

8. Supports and guides security administrators, analysts, project/program managers and liaisons regarding their compliance to standards.

5%

9. Research, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors.

5%

10. Contributes to the alignment of security governance with Enterprise Architecture (EA) governance and project and portfolio management (PPM).

5%

What typical decisions does this job have total authority for making?

  • n/a

What typical decisions does this job refer to others for approval?

  • Changing or implementing new security standards

What level associate (job title) provides work direction for this job?

  • VP, CISO, CIO, Sr. Director, Director, Lead Cyber Security Architect, Senior Cyber Security Architect

What level associate (job title) reviews and approves work in progress or when completed?

  • VP, CISO, CIO, Sr. Director, Director, Lead Cyber Security Architect, Senior Security Architect

Education & Experience

Minimum Requirements typically required for someone to be performing fully (competent) in this job:

Level of Formal Education:

Bachelor’s degree or master’s degree in computer science, information systems or other related field; or equivalent work experience.

Area of Study:

Computer Science, Information Management, Security, Compliance or Relevant Work Experience

Years of Experience:

8+

Type of Experience:

  • Combined IT and security work experience, with a broad experience designing the secure deployment and monitoring of applications and infrastructure into public cloud services (e.g., AWS or Microsoft Azure).
  • Knowledge of industry practices and technical systems, and the potential use of technology solutions in a business environment.
  • Knowledge of a security-specific architecture methodology or standard (ex. ISO 2700x, PCI).
  • Proficiency in performing risk, business impact, control, and vulnerability assessments, and in defining treatment strategies.
  • Familiarity with agile development methodologies.

Special Certifications:

(CPA, Etc.)

Professional security management certification is desired, for example:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Certified Expert (OSCE)

Or other similar information security credentials

Language Skills:

English

Technical Competencies:

  • Knowledge of web-related technologies (Web applications, Web Services, and Service-Oriented Architectures) and of network/web related protocols.
  • Experience assisting with designing and developing security policies, standards, and procedures e.g., firewall management, SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption), user account management (SSO, SAML), and password/key management.
  • Experience with a combination of the following: C or C++/Java/Ruby/ASM/other languages, scripting languages (Bash, Perl, Python), web application testing/exploitation, database testing/exploitation or cloud instance testing/exploitation is preferred
  • Knowledge of and experience with cloud architecture deployments across key security domains, including, but not limited to, Data Security, Network Security, and Identity & Access Mgmt.
  • Experience designing the secure deployment and monitoring of applications and infrastructure into public cloud services (e.g., AWS or Microsoft Azure)

Competencies:

  • Proven ability to work and interact closely with senior management levels to determine their business needs and obtain support for initiatives
  • Strong organizational experience
  • Strong security technical skills with the ability to synthesize relevant information and make key decisions
  • Strong analytical skills to relate security requirements to appropriate security controls
  • Excellent communication abilities and relationship building skills
  • Written, verbal, and presentation skills with the ability to effectively interact with internal and external business partners
  • Ability to think strategically
  • Understanding of complex automated systems

Information Systems:

(People Soft, etc.)

Familiarity with various technologies (Cloud SaaS, PaaS, IaaS, On Premise, package, custom, etc.)

~~Immediate joiner will be preferred~~

Please share your profile nancy.pahuja@compucom.com

Nancy Pahuja:9911095636

Company Information