Cyber Security Architectother related Employment listings - Allendale, SC at Geebo

Cyber Security Architect

Role PurposeThe purpose of this role is to design the organisation'scomputer and network security infrastructure and protect its systems andsensitive information from cyber threats.DoDesign and develop enterprise cyber security strategyand architectureUnderstand security requirements by evaluating businessstrategies and conducting system security vulnerability and riskanalyses Identify risks associated with business processes, operations,information security programs and technology projectsIdentify and communicate current and emerging security threatsand design security architecture elements to mitigate threats as theyemergeIdentify security design gaps in existing and proposedarchitectures and recommend changes or enhancementsProvide product best fit analysis to ensure end to end securitycovering different faucets of architecture e.g. Layered security,Zoning, Integration aspects, API, Endpoint security, Data security,Compliance and regulationsDemonstrate experience in doing security assessment against NISTFrameworks, SANS, CIS, etc.Provide support during technical deployment, configuration,integration and administration of security technologiesDemonstrate experience around ITIL or Key process-orienteddomains like incident management, configuration management, changemanagement, problem management etc.Provide assistance for disaster recovery in the event of anysecurity breaches, attacks, intrusions and unusual, unauthorized orillegal activityProvide solution of RFP's received from clients and ensureoverall design assuranceDevelop a direction to manage the portfolio of to-be-solutionsincluding systems, shared infrastructure services, applications,hardware related to cyber risk security in order to better matchbusiness outcome objectivesAnalyse technology environment, enterprise specifics, clientrequirements to set a collaboration design framework/ architectureDepending on the client's need with particular standards andtechnology stacks create complete RFPsProvide technical leadership to the design, development andimplementation of custom solutions through thoughtful use of moderntechnologyDefine and understand current state solutions and identifyimprovements, options & tradeoffs to define target state solutionsClearly articulate and sell architectural targets, recommendationsand reusable patterns and accordingly propose investment roadmapsEvaluate and recommend solutions to integrate with overalltechnology ecosystemTracks industry and application trends and relates these to planningcurrent and future IT needs Stakeholder coordination & audit assistanceLiaise with stakeholders in relation to cyber security issuesand provide timely support and future recommendationsProvide assistance in maintaining an information security riskregister and help with internal and external audits relating toinformation securitySupport audit of security best practices and implementation ofsecurity principles across the organization, to meet business goalsalong with customer and regulatory requirementsAssist with the creation, maintenance and delivery of cybersecurity awareness training to team members and customersProvide training to employees on issues such as spam andunwanted or malicious emailsStakeholder InteractionStakeholder TypeStakeholder IdentificationPurpose of InteractionInternalProgram Manager/DirectorRegular reporting & updatesInfrastructure (CIS team)For infrastructure supportExternalCustomerTo coordinate for all security breaches & resolutionsDisplayLists the competencies required to perform this role effectively:
Functional Competencies/ SkillLeveraging Technology - Knowledge of current and upcoming securitytechnologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) andunderstanding of compliance regulatory requirement like PCI DSS, HIPAA,etc.- ExpertSystems Thinking - Understanding of the Wipro system(interrelatedness, interdependencies and boundaries) and perform problemsolving in a complex environment - ExpertLeveraging Technology - In-depth knowledge of and mastery overecosystem technology that commands expert authority respect -MasterTechnical Knowledge - Certified Information Systems SecurityProfessional (CISSP), Cloud Architect Certification from AWS and Azure,ToGAF or SABSA certification-MasterCompetency LevelsFoundationKnowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.CompetentConsistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well.ExpertApplies the competency in all situations and is serves as a guideto others as well.MasterCoaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization.Behavioral CompetenciesEffective CommunicationManaging ComplexityClient centricityTechnology AcumenInnovationProblem Solving approachCollaborative WorkingExecution ExcellenceDeliverNo.Performance ParameterMeasure1.Customer centricityTimely security breach solutioning to end users, Internalstakeholders & external customers experience, CSAT, educating andsuggesting right control to the customers.2.Support sales team to create wins% of proposals with Quality Index>7, timely support ofthe proposals, identifying opportunities/ leads to sell services within/outside account (lead generation), no. of proposals led
Salary Range:
$80K -- $100K
Minimum Qualification
Systems Architecture & Engineering, IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.