ABOUT THE ROLE:
We are seeking an experienced Information Security Architect to join our IT Security team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services.
Key Responsibilities:
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Perform security reviews identify gaps in security architecture and develop a security risk management plan.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
Determine the protection needs (i.e. security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Key Skills
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g. baseline validated design and target architectures.)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes.
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations.
Ability to map system configuration details to Security Policy Controls.
| Skill | Required / Desired | Amount | of Experience |
| Proven expertise in specific security technologies (e.g. SIEM DLP IAM cloud security) | Required | 5 | Years |
| Experience in information security with a focus on security technologies. | Required | 5 | Years |
| Excellent verbal and written communication skills; ability to convey complex security concepts in a clear and relatable manner. | Required | 3 | Years |
| Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions oper | Required | | |
| Ability to map system configuration details to Security Policy Controls. | Required | | |
| Ability to work independently and as part of a team. | Required | | |
| Proficient in documentation tools (e.g. Microsoft Word Adobe Acrobat Confluence). | Highly desired | 3 | Years |
| Excellent organizational skills and attention to detail. | Highly desired | 3 | Years |
| Strong verbal and written communication skills. | Highly desired | 3 | Years |
| Experience in project management and leading cross-functional initiatives | Highly desired | | |
| Relevant certifications (e.g. CISSP CISM CCSP) preferred. | Highly desired | 3 | Years |
ABOUT THE ROLE: We are seeking an experienced Information Security Architect to join our IT Security team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services. Key Responsibilities: Identify and prioritize critical business fun...
ABOUT THE ROLE:
We are seeking an experienced Information Security Architect to join our IT Security team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services.
Key Responsibilities:
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Perform security reviews identify gaps in security architecture and develop a security risk management plan.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
Determine the protection needs (i.e. security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Key Skills
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g. baseline validated design and target architectures.)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes.
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations.
Ability to map system configuration details to Security Policy Controls.
| Skill | Required / Desired | Amount | of Experience |
| Proven expertise in specific security technologies (e.g. SIEM DLP IAM cloud security) | Required | 5 | Years |
| Experience in information security with a focus on security technologies. | Required | 5 | Years |
| Excellent verbal and written communication skills; ability to convey complex security concepts in a clear and relatable manner. | Required | 3 | Years |
| Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions oper | Required | | |
| Ability to map system configuration details to Security Policy Controls. | Required | | |
| Ability to work independently and as part of a team. | Required | | |
| Proficient in documentation tools (e.g. Microsoft Word Adobe Acrobat Confluence). | Highly desired | 3 | Years |
| Excellent organizational skills and attention to detail. | Highly desired | 3 | Years |
| Strong verbal and written communication skills. | Highly desired | 3 | Years |
| Experience in project management and leading cross-functional initiatives | Highly desired | | |
| Relevant certifications (e.g. CISSP CISM CCSP) preferred. | Highly desired | 3 | Years |
View more
View less