Led Cyber Security Architect
Posted on Jan 3, 2020 by Request Technology - Craig Johnson
*This role can be a possible remote role for the right candidate*
Prestigious Enterprise Company is currently seeking a Cyber Security Architecture Lead with strong Cloud, Infrastructure, and Application Security experience. Candidate will be responsible for engaging IT projects to prescribe protection measures for new and redesigned IT solutions, identifying pre-production technical security control deficiencies, subscribing IT solutions to enterprise technical security platforms, developing and maintaining a technical controls framework, and designing technical hardening standards.
Candidate will work with the project team to define the scope, work effort, and deliverables for the security engineering engagement and will oversee multiple engagements executing in parallel. In addition to being an individual contributor, the lead cyber security Architect has overall responsibility for delivering multiple technical design engagements on-time and on-budget, and is expected to effectively exercise leadership and guidance to enable the team's success.
Design, build, and lead a team that ensures the security of enterprise data and systems by specifying requirements for technical security controls for all enterprise information technology development initiatives.
Develop a capability to design, implement, and continuously update a technical security control requirements model supporting enterprise information security policies and standards, enterprise technology strategy, enterprise technology architecture and patterns, information security industry best practices, emerging information security technologies, and relevant laws and regulations (eg HIPAA, Sarbanes-Oxley, GLB, and others.)
Develop a capability to evaluate the architecture and design of existing and proposed information technology systems against the enterprise technical security control requirements model. Enable the organization to identify any gaps between specific technical security requirements and the architecture of a given system and provide detailed technical recommendations on appropriate design or architecture improvements.
Develop a capability to assist the organizations responsible for the architecture, design, implementation, and deployment of technical security controls by providing virtual team resources and knowledge sharing to enterprise information technology development initiatives.
Develop a capability to verify that the requirements for technical security controls were addressed correctly and that all recommendations were implemented effectively (this includes collecting necessary information, verifying the accuracy of the information, testing the solution, and building an assurance argument).
Serve as a cyber security subject matter expert, assessing the business impact of cyber security risks to the enterprise and identifying options and recommendations for mitigating those risks.
Identify security control requirements for technology initiatives and deliver effective and practical solutions to meet those requirements in alignment with the overall objectives of the project and the business.
Work with Enterprise Architects and other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently and support business objectives.
Serve as an expert in platform, application, storage, network, virtualization, cloud and mobile security best practices.
Exercise thought leadership in the creation and maintenance of security architectures/design patterns.
Develop technical designs for a project to meet information security requirements based on approved security architectures/design patterns.
Resource planning and engagement management.
Service development and improvement.
Communicate and interact effectively and professionally with co-workers, management, internal and external customers and partners.
Communicate cyber security risks and solutions to various technical and non-technical audiences and levels of management.
Maintain communication with management regarding development within areas of assigned responsibilities and perform special projects as required or requested.
Develop strong working relationships with and offer continuous assistance and thought leadership to other leaders in the information technology organization.
Continuously track and report the status of all capability development and service delivery efforts through boardroom-quality visual communication deliverables.
Comply with HIPAA, Diversity Principles, Corporate Integrity, Compliance Program policies and other applicable corporate and departmental policies.
Strong working understanding of enterprise technologies, operations, and architectural principles and models. Knowledge of virtualized data center architectures and operations, SOA-type deployments, web services and multi-tier web applications, and technologies supporting Intranet, Extranet, and remote access services. Must be able to evaluate disparate IT system architectures and designs in Real Time and recommend appropriate security control and countermeasure solutions.
Strong working understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors).
Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
Externally recognized information security industry thought leadership and innovation accomplishments desired but not required.
Bachelor's or Master's Degree in Computer Science, Information Systems, or other related field (or equivalent work experience).
Technical certification such as GIAC or CISSP is strongly preferred.
8 years of hands-on experience in the information security field with expert knowledge of platform, application, storage, data, network, virtualization, cloud and mobile security.
2 years of experience in information security solution engineering or security service delivery.
2 years of leadership experience with planning and managing security engagements and/or leading a team of technical resources.