who can utilize solid business knowledge and expert technical experience in security to help develop strategy, roadmap and execution for our Cloud Security program. As an architect you will assist in the identification, analysis, evaluation, life-cycle management, and adoption of security technologies in Cloud environments that support business requirements and align with architecture standards and patterns. You will support the secure and efficient migration of enterprise services to the Cloud, while ensuring optimal security posture of existing on-premise services.
Works closely with all areas of Enterprise Information Protection (EIP)’s, business units, and strategic partners and vendors to ensure security initiatives are in line with all other key initiatives that may have interdependencies. Supports project teams to recommend technology and control alignments and reviewed by EIP and that applicable security controls are properly incorporated.
Cyber Security
- Perform risk assessments, follow and enhance the security solutions lifecycle (evaluation, purchase, build, technical policy configuration, integration into Cloud environments, and run).
- Contribute to Cloud security solutions R&D to evaluate the latest cutting edge tools against unfilled strategic security capabilities to drive business priorities
- Act as a subject matter expert on the implementation and capabilities of existing security controls.
- Provides direction and thought leadership to enterprise-wide initiatives applying security principles such as access control, encryption, and host security as well as state of the art and emerging technologies such as cloud computing, mobile computing, and next generation architecture.
- Identifies the need for new security technology solutions; designs, reviews and collaborates on the deployment of new solutions.
Cloud Security Architecture
- Develops security architecture strategies that align to enterprise architecture strategy and the company's business strategy for Cloud
- Develops in depth security architecture standards, frameworks and design patterns spanning all layers of security in the Cloud from host, server, mobile, and network to application and data security.
- Architects, designs, prioritizes, coordinates, and communicates the security technologies necessary to ensure a highly secure yet usable computing environment in the Cloud.
- Provides security guidance across the system development life cycle, including security architectural reviews.
- Contributes to the development and implementation of security technology solutions for complicated and more complex environments and architecture.
- Analyzes business impact and exposure based on emerging security threats, vulnerabilities and risks, and recommends technologies and solutions to mitigate them.
- Stays current with leading and emerging security technologies and makes recommendations for use based on business value.
- Works closely with other technology architects to ensure security is properly represented in their technology domains and to ensure consistency and compatibility among EIP strategies and standards.
- Actively communicates with stakeholders to drive awareness and understanding of security architecture roadmaps and directions.
Research and Development
- Stays continually informed about the latest developments in the security field, including mitigation strategies, threats, tools, attack vectors, and cutting edge preventative measures.
- Participates in new products or technology solutions supported by appropriate ROI, total cost of ownership, and/or cost benefit analyses.
- Performs technical proof of concepts.
- Experience with implementing security tools and architecture in Cloud environments such as(not all are required):
- Access Controls
- Data Loss Prevention (DLP)
- Web Application Firewalls (WAF)
- Secure SDLC and Software Security
- Nextgen Firewalls
- Anti-malware and anomaly detection controls
- Data encryption in transit and at rest
- Network security
- Monitoring
- Experience with a formal requirements definition and RFI/RFP process