drjobs Managing Software Engineer

Managing Software Engineer

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Chicago, IL - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

The Senior Security Architect is responsible for thought leadership in enterprise initiatives that involve the latest business demands such as cloud computing mobile virtualization as well as tried and true techniques such as access control encryption networking and host security. This individual will be collaborating with the business and other technologies experts to develop defense in depth security reference architectures security architecture standards and frameworks spanning all layers of security from host server and network to application and data security.

Job Responsibilities:

  • Identifies the need for new security technology solutions; designs reviews and collaborates on the deployment of new solutions. Contributes to the development and implementation of security technology solutions for enterprise environments and architecture.
  • Participates in request for information/request for proposal (RFI/RFP) and vendor selection processes and leads the technical design of the deployment. Technologies might include: Database security; Enterprise encryption - application and whole disk; Authentication and Authorization systems such as two-factor federated single-sign-on Active Directory/Light Weight Access Protocol (AD/LDAP); Cloud computing / virtualization; Container Security; Data leakage identification and prevention; Network/Wireless access controls; Intrusion Detection and Prevention; Security Incident and Event Management; Web application firewalls; Host based controls; Application gateway security controls; Voice over Internet Protocol (VOIP) security controls.
  • Acts as a subject matter expert on the implementation and capabilities of all existing security controls within WBA particularly in the case of complex and complicated security issues.
  • Conducts system architecture reviews for new technology to ensure best practices document security solutions and enables re-use of processes.
  • Handles the ongoing documentation development implementation and maintenance of processes procedures and services associated with architecture functions including ensuring requirements and deliverables are clearly defined.
  • Works with Operations teams to ensure security architectures are appropriately assessed and able to be supported.
  • Works with Engineering and Operations teams to implement new technologies and security solutions in alignment with industry best practice and commonly accepted principles of secure design.
  • Planning and implementing security controls over Azure infrastructure and implementing Single Sign On using AzAD Application Proxy B2C.
  • Experience with Active Directory Azure Active Directory (AAD) AAD Connect
  • In-depth knowledge of security trust-based models micro-segmentation architectures and IAM authentication and access capabilities
  • Experience with the design and implementation of Azure AD hybrid identity RBAC PIM Identity Protection MFA Azure App Proxy SSO and Condition Access
  • Strong understanding of Cloud Security Expertise in Azure Infrastructure operations security tools inclusive of: Security and Audit dashboard Azure Resource Manager Templates Azure Monitor Azure Monitor Logs Azure Security Center Azure Application Gateway RBAC for storage accounts Shared Access Signatures(SAS) Storage Service Encryption VPN Gateway Azure Key Vault Azure Site Recovery Azure Active Directory (AAD) Single Sign-On(SSO) Condition Access Azure Sentinel and Splunk SIEM Expertise in Infrastructure and data security.

Qualifications

Basic Qualifications:

  • Bachelors degree and at least 5 years of experience in Information Security and IT designing and implementing enterprise solutions OR a High School Diploma / GED and at least 7 years of experience Information Security and IT designing and implementing enterprise solutions.
  • Available to work on call during evenings weekends and holidays
  • At least 3 years of experience translating technical data into business impact information and experience analyzing and troubleshooting various IT Security technologies.
  • At least 3 years of experience managing multiple tasks/projects simultaneously and meeting established deadlines.
  • At least 3 years of experience with security technologies such as application security cloud security containerization data leakage prevention encryption techniques identity and access management mobile security network security and virtualization security.
  • Experience writing security standards architecture documents and baselines for infrastructure and applications.
  • Experience communicating conceptual and technical information both verbally (on phone one-on-one to groups) and in writing (emails letters reports presentations) to various audiences (work group team company management external clients).
  • Team leading skills
  • Thought leadership
  • 1 around customer focus securing customer data

Preferred Qualifications:

  • Bachelors Degree in Computer Science or MIS
  • At least 3 years of experience with Information Security Architecture or operations.
  • Knowledge of application security cloud security containerization data leakage prevention encryption techniques identity and access management mobile security network security and virtualization security.

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.