Description

We are seeking a talented and experienced Security Architect to join our team. The Data Security Architect will be responsible for designing, building, testing, and implementing security systems within our hybrid IT environment. This role requires a thorough understanding of complex IT systems and the latest security standards, systems, and authentication protocols.

 

Responsibilities:

• Design and implement robust security architectures for IT projects that encompass security principles of Confidentiality, Integrity, and Availability.

• Ensure the architecture and security systems align with the business’s goals and requirements.

• Develop and maintain security policies, standards, and guidelines.

• Research, design, and advocate new technologies and security products from a people processes, and technology standpoint.

• Demonstrated ability to operationalize new or existing security products.

• Document and verify the success of the security program by measuring key performance indicators.

• Identify integration issues and develop solutions to these issues.

• Ensure compliance with changing laws and applicable regulations.

• Participate in incident response and forensic investigations.

• Collaborate with the business, IT department, and information security team to design, implement, manage, and report on the effectiveness of security controls.

• Stay up-to-date with the latest security systems, standards, authentication protocols, and products.

• Conduct system security and vulnerability analyses and risk assessments.

• Establish data architecture standards, principles, and frameworks that embed security, privacy, and regulatory compliance requirements into all data architecture solutions.

• Foster a culture of data ownership and accountability across the organization with a focus on data security, privacy, and compliance.

• Additional duties as assigned.


Qualifications:

• Proven work experience as a Security Architect, Security Analyst, or similar role.

• Demonstrated knowledge and implementations of security frameworks such as MITRE Attack, NIST, CIS, etc.

• Working knowledge of security principles like confidentiality, integrity, availability, least privilege, defense in depth, separations of duties, zero trust, etc.

• Professional certification preferred, such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM).

• Experience with cloud platforms, risk assessment tools, threat modeling, and data encryption.

• Knowledge of disaster recovery, computer forensic tools, technologies, and methods.

• Excellent problem-solving skills and ability to work under pressure

Education

Any Gradute