Cybersecurity Architect
Arlington, TX 76014 (Hybrid Schedule)
Permanent Opportunity
Job Description:
Required Skills & Experience
Bachelor’s Degree in Information Technology, Information Security, Information Assurance, Information Management in related field or equivalent work experience required
7-10 years experience as a Cybersecurity Architect with a large enterprise company. Should have a strong understanding of cyber security concepts and principles (eg. differentiating between hashing and encryption algorithms).
2-4 years of experience securing cloud deployments in Microsoft Azure, Amazon Web Services (AWS), or GCP.
Experience within the financial services/FinTech industry or another heavily regulated industry required.
Experience with firewalls, IDS, log management and troubleshoot network devices required.
Experience with managing infrastructure through CI/CD pipelines required.
Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environments preferred.
Certification in one or more Cybersecurity disciplines (CISSP or CISM) or equivalent experience required.
Certifications in Cloud Cybersecurity (eg, CCSP, CCSK, or cloud provider specific) preferred.
In depth, hands-on understanding in application architecture and technology including web applications, mobile technology, and identity and access management.
Possesses knowledge in various information security areas, such as: Identity and Access Management, Threat and Vulnerability Management, Information Risk and Governance, IT architecture, Cloud Architecture, Monitoring, Incident Response, and Security Strategy.
Stable work history with excellent communication skills.
What You Will Be Doing
Developing and designing comprehensive security processes and controls into the IT infrastructure.
Designing and maintaining a secure development life cycle.
Proactively engaging with other departments to define initial requirements by analyzing threats and risks, facilitating security reviews to identity vulnerabilities, and testing and validating security requirements' alignment for new and redesigned deployments.
Analyzing the threats and risks to consider malware analysis, vulnerabilities, and known exploits.
Working with the application teams and IT groups by providing information on Cybersecurity practices, risk assessments, and supporting incident response in the investigation of incidents.
Working with internal and external groups to validate the proper Cybersecurity policies and standards are effectively operating.
Assisting in the articulation and implementation of the Cybersecurity Strategy across departments and organization.
Working with IT departments, IT Architects, data custodians, and governance groups to develop and updating Cybersecurity controls, requirements, processes, procedures for secure infrastructure and application architecture
Determining security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security, vulnerability analyses, and risk assessments; reviewing architectures and designs; identifying integration issues; and preparing cost estimates.
Providing function and business requirements for security solutions, initiatives, and identified areas to improve security posture.
Recommending and implementing changes in security policies and practices in accordance with changes in regulatory or financial services industry cybersecurity practices.
Providing input to Engineers and Developers for additional configuration of application firewalls via IT project management and change management.
Managing the efforts to conduct Cybersecurity control assessments for systems which store customer or sensitive information whether hosted internally or cloud based.
Assessing, advising and communicating security risks associated with development practices in place.
Assisting Cybersecurity Management in creating, reviewing, and updating the Cybersecurity Strategy on a periodic basis.
Planning security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designing public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
Monitoring adherence to standards in architecture, application design, development, and testing frameworks.
Partnering with infrastructure, application, and other stakeholders to ensure deployed solutions minimize security and privacy risks.
Acting as a mentor providing guidance to all team members on security issues.
Collaborating on the development and delivery of an education and training program on Cybersecurity and privacy for employees, contractors, and other authorized users.
Thank you!