Cloud Security Architect at Remote, Remote, USA |
Email: [email protected] |
Cloud Security Architect Tampa,FL combined IT and Security work experience, with a broad exposure to infrastructure/network, Cloud (IaaS/PaaS), and multiplatform environments. Excellent interpersonal skills with the ability to translate complex technical issues into clear and concise language for non-technical audiences, including executive management. Extensive experience in designing and managing security solutions for systems hosted in cloud platforms like Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure. Demonstrated ability to launch and deliver multiple major architecture initiatives using internal and external staff. Experience working in large, complex organizations with a strong reliance on real-time 24x7 IT and security operations. Proficiency in secure software design, secure architectures, security testing, vulnerability detection and remediation in a CI/CD pipeline. Significant experience and detailed technical knowledge in multiple areas of security engineering, system and network security, authentication and security protocols, cryptography, and application security. Provide direct and indirect leadership, guidance, and expert advice to develop, promote, and maintain cybersecurity controls and performance measures, ensuring the cost-effective protection of company assets. Lead the definition of system, technical, application, and deployment of cybersecurity architectures and programs, recommending courses of action to maintain cost-effectiveness and competitiveness across multiple programs, products, platforms, and services. Research, design, and advocate for new technologies, architectures, and security products that support security requirements for the enterprise, its customers, business partners, and vendors, while avoiding vendor sprawl. Serve as a cybersecurity subject matter expert in areas such as M&A, product development, secure software development, cloud infrastructure/platform security, network security, system and application security, identity/access management, and zero trust. Develop the business, information, and technical artifacts that constitute the enterprise cybersecurity architecture and solutions within each respective domain. Hire, develop, and mentor security practitioners while managing day-to-day team activities. -- Keywords: continuous integration continuous deployment information technology Florida |
[email protected] View all |
Thu Jan 25 02:13:00 UTC 2024 |