Very Urgent role: Security Architect | Remote at Remote, Remote, USA |
Email: [email protected] |
From: Anurag, tekinspirations [email protected] Reply to: [email protected] Hey Check this urgent role Security Architect 12+ Months Remote MOI: SKYPE Resumes looking for threat modeling and sec architect in title Notes for Architect: Need to know these methodologies: TOGAF, PASTA, STRIDE TOGAF mention Leads the development of a strategic security architecture vision, including standards and frameworks that are aligned with overall business strategy using the current technology roadmap. Participates in the writing of Security Standards and Policies. Create security strategies to improve controls and architecture for critical security infrastructure including endpoints, mobile devices, containers, authentication and authorization, logging, and threat detection. Provide subject matter expertise on infrastructure (on-prem & cloud), application, and database security. Works with the business and IT from and security perspective - determines security requirements and infosec strategy by evaluating business strategies and requirements; researching information security standards; conducting system security, vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. Collaborate with Dev teams in designing and continuously improving the Secure Software Development Lifecycle (S-SDLC) Enabling and facilitating Proof of Concepts. Maintain a deep technical knowledge of Microsoft data center technologies, including Active Directory, Office 365, Azure, and Windows Servers. Work with the appropriate teams to respond to incidents and to take charge when needed. Migrate on-premises workloads to the cloud. Manage cloud environments (Azure, AWS, GCP, etc.) to ensure optimal security, performance, scalability, availability, and operations. Works with Engineering for the continuous improvement of the companys Public Key Infrastructure (PKI) systems and automations. Review existing architecture, identify design gaps, and requiring security enhancements. Coordinates with members of the IT and technology organization, as well as business, to plan, develop, implement and maintain compliance with Center for Internet Security (CIS) or other security configuration frameworks. Maintain knowledge and stay up to date regarding new security technologies and integrate new technologies into security architecture design when appropriate. Represent the security team in change control activities and ensure proposed changes are in alignment with security best practices. Write formal security assessments as well as providing smaller ad-hoc system security reports by collecting, analyzing and summarizing data and trends as necessary. Develop security metrics and measurement capability to demonstrate operational security posture. Performs other security team relevant duties and responsibilities as assigned. Qualifications Experience / Education / Certifications Bachelors degree preferred in Computer Sciences, Information Technology, or related field. Experience with container-based orchestration (Kubernetes and similar) and microservices architecture Working knowledge of Zero Trust Network Architecture (ZTNA) Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series. At least one industry standard certification such as GSEC, Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) or other security vendor certification. Skills Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus. Clear ability to build strong relationships and establish trust with stakeholders at all levels. Excellent verbal and written communications skills. Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner. Ability to solve complex problems in a timely manner by working with multiple stakeholders. Ability to manage multiple tasks and work streams effectively. Ability to follow detailed processes and procedures with a high degree of accuracy. Customer-focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high-quality work products. Experience of network design, mobile security, network and firewall security technologies and vulnerability management, scanning. Knowledge of web application security, browser security models, and application security vulnerabilities such as the OWASP Top Ten. Experience managing project through the full system development lifecycle. Multiple language abilities preferred fluency in English (written and spoken) required. Deep understanding of network attacks, DDoS, Phishing, email protocols/security/spam, encryption, authentication, logging and log analysis, IP and device reputation, and security rules and policies. High degree of skill and knowledge in managing and part taking in incident response, Intrusion Prevention Systems, Intrusion Detection Systems, SEIM, Endpoint security solutions. Thanks and Regards, Anurag Singh Technical Recruiter TEK Inspirations Pvt. Ltd. | [email protected] Disclaimar : This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited, To remove your email address permanently from future mailings, please send REMOVE to [email protected] . Keywords: active directory information technology Very Urgent role: Security Architect | Remote [email protected] |
[email protected] View all |
Wed Aug 07 03:52:00 UTC 2024 |