- Create and maintain processes and procedures within the security architecture domain.
- Identify and mitigate security risks through threat modelling and security gap assessments.
- Collaborate with peers to ensure compliance with relevant regulatory and contractual security requirements.
- Communicate & enforce security policies and procedures and requirements clearly to both technical and non-technical stakeholders.
- Conduct complex risk analyses for information systems' security and recommend innovative solutions.
- Work with users, developers, third party providers, and other technical stakeholders to integrate security considerations into development and operational decisions.
- Ability to identify threats/risks
- Ability to apply knowledge of security domains including but not limited to common threats and vulnerabilities, Network, Identity, and Backup to different business scenarios
- Extensive ability to estimate, plan, lead and execute complex technical projects while working independently and/or in a team. Undertaking and completing project tasks on schedule with minimal to no supervision.
Knowledge:
- Hands on knowledge to complete assessments using industry-standard and organizationally accepted analysis principles and methods.
- Advanced knowledge of common attacks, attack methods, and defense architectures.
- Familiarity with cybersecurity frameworks and standards (e.g., ISO 27000, NIST, PCI) and industry-relevant regulations guiding architectural requirements.
- Experience in developing and designing security best practices for all layers of the hosting and application stack in both cloud and on-premises environments.
- Ability to establish strategies for and implement cloud enterprise solutions in AWS, GCP, or Azure.
- Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls, and security protocols (e.g., multi-factor, SAML, OAuth, OIDC).
- Understanding of application security implementations and best practices.
- Proficiency in threat modeling (e.g., STRIDE, PASTA, OCTAVE).
- Knowledge of cryptographic technologies, including transit encryption, storage encryption, hashing, KMS, digital signatures, etc.
- Subject matter expertise in cloud architectures, secure integrations, data protection, IT risk, network security, application security, and Identity and Access Management.
- Deep knowledge of securing complex hybrid architectures.
|
Experience:
- 5-6 years of relevant security architecture experience
- Bachelors , Computer Sciences, Computer Engineering, Information Security, or other related engineering degree, or equivalent experience.
|
|