Home

Cyber Security Architect _ Atlanta, GA at Atlanta, Georgia, USA
Email: [email protected]
Greetings,

We have the below requirement with our Client. Kindly go through the JD below and let me know your interest

Role name: Agile Architect

Atlanta, GA

Duration : Contract

Role Description:

1. Perform Threat Analysis & Create/Update the Threat Modelling

The Information Security Architect performs threat analyses for complex technical designs and reports the results using standard templates.

The Information Security Architect creates the initial Threat Modelling (with new applications/systems) or updates an existing Threat Modelling (with upgraded applications/systems).

The Information Security Architect tracks critical and high findings and updates the respective changes in the Threat Modelling.

2. Derive Security Requirements

Given application or system descriptions, the Information Security Architect derives security requirements that will match the respective level of abstraction.

3. Review Design and Report Issues

The Information Security Architect reviews the design documents with respect to

o Fulfilment of security requirements o (Common) design errors

o Already known design shortcomings (are they fixed or not)

The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.

4. Review Implementation and Report Issues

The Information Security Architect reviews the implementation with respect to

Fulfillment of security/design requirements

(Common) implementation errors,

Already known implementation shortcomings (e.g., from Code scan or Pen Testing, are they fixed or not)

The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.

5. Review Project Security Planning and Report Issue

The Information Security Architect reviews various project management documents with respect to o plausibility of effort estimates for planned security tasks,

o plausibility of cost estimates for planned security tasks,

o overall plausibility of the timeline for security tasks,

o the overall progress of security,

o completeness of planned security tasks o security budget planning,

o ordering status of mandatory security services,

o mandatory security-related tasks

The Information Security Architect submits a written report that lists.

o all shortcomings, together with suggestions on how to fix them,

o all possible risks to achieving project goals that relate to information security.

6. Cyber Security Incident Management

Responsible for end-to-end cyber security incident management process.

7. Various Expert Consulting

The Information Security Architect will answer explicit questions on various security-related subjects, e.g. on

o Information Classification,

o Security aspects of project management,

o Technical information security, etc.

o Cryptography,

o Cloud Security,

o TPRM

Third-Party Risk Management

o Vulnerability Review and Assessment,

o Dev Sec-ops

o Security Tools

o Audit Support (External and Internal)

8. Technical Security Tasks

Given the necessary input, the Information Security Architect will perform complex tasks with a specific, well-described result.

Competencies: Cyber Security - Information Security

Experience (Years): 10 & Above

Best Regards,

Jessica
|Sr Techical Recruiter| Email:

[email protected]

Siri InfoSolutions Inc
, 3 Ethel Rd, Suite # 302, Edison NJ 08817.

Disclaimer: We respect your online privacy. If you would like to be removed from our mailing list please reply with "Remove" in the subject and
we will comply immediately. We apologize for any inconvenience caused. Please let us know if you have more than one domain. The material in this e-mail is intended only for the use of the individual to whom it is addressed and may contain information that
is confidential, privileged, and exempt from disclosure under applicable law. If you are not the intended recipient, be advised that the unauthorized use, disclosure, copying, distribution, or the taking of any action in reliance on this information is strictly
prohibited. We are an equal opportunity employer with a diverse workforce. Note : Any resume submitted by
Siriinfo is presented with the understanding that the candidate is being considered for your direct end-client (end-client is the company where the work will be performed). If there is any other company involved between the end-client and your company,
please do not submit this resume without our written approval. If you submit the resume to another third party,
Siriinfo reserves the right to work with the third party directly.

--

Keywords: information technology golang Georgia New Jersey
Cyber Security Architect _ Atlanta, GA
[email protected]
[email protected]
View all
Fri Apr 19 19:48:00 UTC 2024

To remove this job post send "job_kill 1326043" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,