Cyber Security Architect Resume Samples

4.7 (121 votes) for Cyber Security Architect Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber security architect job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
WK
W Kreiger
Wava
Kreiger
46324 Gerlach Inlet
Philadelphia
PA
+1 (555) 236 2112
46324 Gerlach Inlet
Philadelphia
PA
Phone
p +1 (555) 236 2112
Experience Experience
San Francisco, CA
Cyber Security Architect
San Francisco, CA
Emard-Effertz
San Francisco, CA
Cyber Security Architect
  • Worked closely with customers, project managers and other engineers to develop customized Security solution
  • Provide training, presentations and coaching on project management and/or process improvement
  • Participates and provides input for any performance management activities
  • Provide high-level systems architectural expertise to managers and technical staff
  • Develop cross Service-Line relationships at a peer-group level to facilitate interworking and efficiencies
  • Work within the CISO team to improve the overall Cybersecurity plans
  • Working with project teams to define and provide guidance on strategic security controls and direction
Philadelphia, PA
Lead Cyber Security Architect
Philadelphia, PA
Stracke, Lockman and Kassulke
Philadelphia, PA
Lead Cyber Security Architect
  • Provide technical direction for development, engineering, interfacing, integration and testing of components of system
  • Work alongside electronics hardware and software engineers and with IT, acting as the security advisor and providing guidance on security architecture
  • Interface directly with customer and program management team
  • Provide technical oversight of program milestone reviews
  • Drive solution for hardware, software, and develop policies and procedures for securing operational infrastructures
  • Provide internal and external customers with technical design support to system acquisition specification, design, proof-of-concept prototyping, development and evaluation of management information and decision support systems
  • Review new security technologies, help select third party suppliers, and create solutions to effectively mitigate security theats/risks
present
San Francisco, CA
Senior Cyber Security Architect
San Francisco, CA
Treutel-Heaney
present
San Francisco, CA
Senior Cyber Security Architect
present
  • Identifying and working with cross functional organizations towards resolving security issues
  • Assist with the development, revision, and maintenance of Standard Operating Procedures and Working Instructions related to IT Security
  • Reviewing and completing detailed risk assessments on new technologies and solutions
  • Provide mentoring and cross training
  • Assist with the development and maintenance of IT security measurement and reporting systems to aid in monitoring effectiveness of IT Security programs
  • Maintain product data in existing product tracking database
  • Provides consulting support to projects during the vision and strategy, architecture, and development phases
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of San Francisco
Bachelor’s Degree in Computer Science
Skills Skills
  • Working knowledge of all vulnerability classes on the OWASP Periodic Table of Vulnerabilities
  • Ability to provide detailed network Security drawings and diagrams and relation as-built documentation
  • Knowledge of messaging, service, and event-based infrastructure. Experience modeling data, message, and service interoperability
  • Be knowledgeable of web and mobile application development and security vulnerabilities
  • Possess strong knowledge of database security controls, including access control, auditing, and configuration best practices
  • Strong time/project management skills with the ability to operate under deadlines and manage fluctuating workloads
  • Certified Information Systems Security Professional (CISSP) is desirable
  • Understanding of network architecture and concepts, application architecture, and interoperability of these architectures with one another
  • Strong presentation and written communication skills and effective interaction, internal and external, with all levels of management
  • Domain knowledge in cybersecurity principles, risk assessment, testing, risk, risk mitigation and threat response
Create a Resume in Minutes

15 Cyber Security Architect resume templates

1

Cyber Security Architect Resume Examples & Samples

  • Evaluate and promote new and existing security standards, solutions and tools
  • Design, implement, document, and promote infrastructure security solutions
  • Establish a 3-year rolling security strategy to address trends, threats and opportunities
  • Perform vulnerability/risk analyses of AMD Systems and applications during all phases of the system development life cycle
  • Communicate areas of risk and vulnerabilities, propose mitigation plans to Management
  • Apply security engineering principles related to building, maintaining, and monitoring secure infrastructure
  • Collaborate with partners to translate security and business requirements into technical designs
  • Provide guidance and set direction in regards to Security policy and processes for L1/L2/L3 support
  • Provide L4 (Level 4) support for all security decisions, and act as the top escalation point for information security decisions
  • Must be able work and communicate effectively with the IT support and engineering teams, network operations center and change management and production support teams
  • Provide security guidance for business and IT projects, and help drive solutions to completion
  • Participate as the security liaison for critical IT initiatives such as disaster recovery, master data modeling, EDW, etc
  • Design monitoring systems to ensure confidentiality and integrity of data and availability of all network services
  • Reviews security logs to monitor unauthorized system access attempts, both internal and external and make recommendations for further action
  • Investigates and follows up on security violations and incidents
  • Translate security requirements and information into effective presentations for non-technical users
  • Develop, maintain and implement security policy, standards and procedures
  • 10+ years professional experience working in information security
  • Subject matter expertise in Networking, *NIX, and Windows security
  • Strong background in vulnerability management processes and tools, and automated patch management required
  • Background in penetration testing desired
  • Background in digital forensics, eDiscovery or Incident Response strongly desired
  • Must be able to work effectively across project teams, and with outside partners
2

Executive Director, Cyber Security Architect Resume Examples & Samples

  • Lead operational, line of business, and engineering functions to develop, review and approve proposed security strategies and frameworks
  • Facilitate organizational change by defining strategies for the firm with respect to technology domain standards and design goals
  • Provide technical design and architectural leadership, including documenting and diagramming the logical, physical, and process views
  • Communicate leading industry practices by giving presentations, working with project teams, and authoring content aimed at educating others about standards, strategies, and otherwise defined leading practices
  • Conduct research focused on identifying emerging technology solutions that reduce costs, increase efficiencies, provide more value, provide more capabilities, reduce risks, and increase security
  • Provide firmwide and line of business executive level updates as required
  • Extensive experience in addressing network perimeter security issues
  • Network engineering background with experience working in enterprise environments implementing large routed and switching domains
  • Prior work experience in a globally-deployed network infrastructure (preferred)
  • Hands-on experience implementing network security frameworks and reference architectures
  • Strong ability with routing, switching, load-balancing, vpn, proxy, wireless, VoIP, netflow
  • Experience designing, building, and maintaining network security technologies, including but not limited to, Firewalls, VPNs, IDS/IPS, Packet Capture and DDoS Mitigation
  • Experience with leading network security solution vendors (e.g. Checkpoint, Cisco, Palo Alto, McAfee, RSA, Symantec, FireEye, Arbor, etc.) required
  • Experience with network and security architectures covering Software Defined Networking (SDN), Network Access Control (NAC), Bring-your-own-Device (BYOD), and Cloud/Virtualization
  • Experience with implementing n-tier application deployments (Web, App, DB), including e-Commerce environments
  • Bachelors of Computer Science preferred
  • Excellent written and communication skills required
3

Cyber Security Architect Resume Examples & Samples

  • 10+ years of strong hands-on experiences and technical depth in one, or more technology areas, including Data security, Infrastructure security, Endpoint/Platform security, Security Analytics, or Application Security
  • Programming experiences in one or more languages (scripting/functional/imperative -- C/C++, Java, Python, Scala, R, etc.)
  • Hands-on experience in building prototypes or full products in Cloud-based environments
  • Experience with Design Pattern-type approaches to development
  • Experience and thought leadership with infrastructure designs for highly secure / trusted computation environments
  • Interest in and currency with a wide range of research topics in security technology architectures, computer science research, and emerging startups
4

Cyber Security Architect Resume Examples & Samples

  • Lead and drive the development and implementation of the security architecture in accordance with the firm's technology roadmap
  • Define, design, evaluate and maintain the enterprise IT Security Architecture
  • Drive the implementation of IT Security Technical Solutions and associated processes and controls
  • Measure adherence to the Architecture within IT to drive progress
  • Delivery of world class solutions architecture consulting
  • Evangelize the benefits of architecture, accepted best practice techniques, standards and tools to the Group and external suppliers where necessary
  • Drive Future State Architecture execution in collaboration with stakeholders
  • Drive partnerships with technology vendors to influence industry direction
  • Govern architecture standards and have a holistic knowledge of the Group's most critical business systems
  • Stay abreast of technology trends and advise IT and the business about potential benefits and impacts
  • Responsible for leading a commercially aware architectural design practice for multiple Global Businesses
5

Cyber Security Architect Resume Examples & Samples

  • Evaluate, design and embed cyber security principles into IT services and processes
  • Review and sign-off IT infrastructure and system design architecture with documentation of identified cyber security weaknesses and required mitigations
  • Define and implement technical cyber security standards in the region to maximize security infrastructure effectiveness and efficiency
  • Implement and revamp cyber security processes and procedures to strengthen defense and incident response capabilities
  • Conduct forensics investigations on cyber security incidents for management and regulatory reporting
  • Design and conduct cyber security risk assessments or tests to identify security exceptions and design practical compensating controls
6

Cyber Security Architect Resume Examples & Samples

  • Guiding, assessing and documenting design of secure solutions and services across Business & BT areas
  • Defining and implementing secure operations, communications, platform and application standards
  • Architecting and directing implementation of technical security solution policies in alignment with business risk
  • Researches, evaluates, recommends, designs, tests, and implements new security technologies
  • Serving as subject matter expert and central point of contact for Cyber Security
  • Prepares and maintains technical user guides, SOPs, security architecture documentation and diagrams
  • Analyze, Document, and Present findings and proposed solutions
  • Continually communicate to project managers and owner
  • Participate in meetings and provide recommendations and strategies for ensuring remediation of gap and deficiencies as projects develop
  • Stay apprised of all projects and new controls defined by Internal Audit, and present new applications and process areas likely to require controls to management
  • Network Based Security Solutions:IPS/IDS, NG Firewalls, Behavioral Analytics, Malware Forensics, etc
  • Host Based Security Solutions:HIDS, Data Loss Prevention (DLP), Tripwire FIM & SCM
  • System & DB Platforms(On-Premises and Cloud):Linux, Windows, Unix, Oracle, DB/2, SQL
  • Monitoring & Analytics:Strong SIEM (Qradar) Implementation & Optimization Experience
  • Secure Communication & System Integration Technologies & Methodologies
  • Documenting work papers as evidence of control success or deficiency
  • CISSP, CEH, GIAC certification preferred
7

Cyber Security Architect Resume Examples & Samples

  • Bachelor's degree and 9 years of experience
  • Five (5) years of experience with managing information security for government customers
  • Working knowledge of the following regulations, standards and publications
  • State experience implementing security controls, development of system security plans, and privacy and security risk assessments
  • Certified Ethical Hacking (CEH)
8

Cyber Security Architect Resume Examples & Samples

  • Work within the CISO team to improve the overall Cybersecurity plans
  • Gain a thorough understanding of the organization’s systems, networks, people, duties, and goals and ensure that they are documented in a standards-compliant framework
  • Documents the organization’s Cybersecurity landscape for several audiences. - Communicates the business requirements and capabilities to executives
  • Communicates the conceptual architecture, system interactions/interfaces, and logical services, to management
  • Communicates the above layers and also the physical infrastructure architecture as well as the technologies, protocols, boundaries, and products of the component architecture to engineers, developers, and administrators
  • Works with experts to identify, document, and track weak points in the architecture based on standardized methodologies and innovative analysis
  • Contributes insights from architectural analysis to evolution of policies and protocols
  • Refines Security monitoring points to defend the architecture
  • Document countermeasures needed as revealed in the architecture
  • Monitors for cascading effects and unintended consequences of system change
  • Supports architecture development of SCADA and SCADA-like systems
  • Produces regular status reports
  • Serves as a business enabler by supporting development of clear planning and design documents for properly-secured, policy-compliant systems and networks
  • Serve as resource supporting the Chief Information Officer through the team leadership
  • Supports system- and network-related policy development and regulatory compliance
  • Promotes application of FISMA compliance standards, including NIST, DISA STIGs, and related guidance and standards for configuration/audit
  • Contributes system and network engineering knowledge in improving the security architecture
  • Performs a key role in Security Leadership
  • Supports requirements of the other CISO leadership groups
  • Demonstrated experience with TOGAF or DODAF architecture development
  • Experience in the roles identified above
  • 4 years dedicated system architecture work
  • Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance
  • Experience with cyber security development projects and programs for U.S. Government and/or commercial clients
  • Experience with development of architecture models for extant legacy systems
  • Extensive experience with three or more of the following
  • Security Incident Event Management
  • Insider Threat Monitoring
  • Vulnerability Assessment testing
  • Computer Network Operations (CNO)
9

Lead Cyber Security Architect Resume Examples & Samples

  • Provide cyber security technical leadership for system development activities including direct interaction with international customers
  • Provide expert advice and recommendations for developing CND capabilities as well as the establishment of CSOCs
  • Drive solution for hardware, software, and develop policies and procedures for securing operational infrastructures
  • Collaborate with a wide range of personnel to facilitate an effective CND and CSOC solution
  • Provide technical direction for development, engineering, interfacing, integration and testing of components of system
  • Provide internal and external customers with technical design support to system acquisition specification, design, proof-of-concept prototyping, development and evaluation of management information and decision support systems
  • Interface directly with customer and program management team
  • Perform requirement elicitation, analysis and functional allocation
  • Provide technical oversight of program milestone reviews
  • Ensure effective and innovative training plan is in place for knowledge transfer
  • Participate in the transition planning of CSOCs
  • Active member in Integrated Product Teams (IPTs) and program Engineering Review Boards (ERBs); with responsibility to foster active engagement across team members
  • Master’s degree in computer science, information assurance, related field
  • Existing US secret security clearance
  • Strong customer relations skills and cultural awareness and sensitivity
  • Familiarity and proven success with working in International markets
  • Raytheon experience and knowledge of engineering processes
  • 12 Years participating in design and development activities, with a B.S./B.A. in Engineering, Computer Science, Mathematics or related field, or 10 years with MS/MA in Engineering, Computer Science, Mathematics or related field, or 8 years with PhD Engineering, Computer Science, Mathematics or related field
10

Cyber Security Architect Resume Examples & Samples

  • As a cyber security architect and security manager for the Porsche project will work with the project team, developers and the Porsche cyber security team
  • Will manage the cyber security activity with other teams to execute the projects and to solve complex cyber security challenges
  • Working together with other European projects and development teams and directly with the customers
  • Design security concepts and measures for the designated projects from network and architecture level
  • Support the process of security-requirements analysis for new European RFx and projects
  • Engineering support for ID/PS (Intrusion Detection Prevention System ) products - ECUSIELD and TCUSHIELD integration to European designated projects
  • Perform on-going risk-assessment to European fielded systems to lower Harman exposure to cyber threats
  • Provide guidance and technical process and support for engineering work
11

Senior Cyber Security Architect Resume Examples & Samples

  • Provide technical input into the design, deployment and operation of global IT Security management software and hardware devices including, but not limited to: AntiVirus defense, Intrusion Detection, encryption systems, authentication and access control systems, network scanning and vulnerability assessment, etc
  • Serve as an incident leader on IT Security incident response teams. Apply forensic investigation techniques to document root cause and impact of detected computer security incidents
  • Perform IT security assessments or audits of internal networks and systems under the direction of the IT Security management. Document findings in written reports with recommendations for remediation
  • Assist with the development and documentation of an overall IT Security architecture to assure confidentiality, integrity and availability of company IT assets
  • Devise and implement countermeasures to mitigate potential security threats
  • Assist with the development and maintenance of IT security measurement and reporting systems to aid in monitoring effectiveness of IT Security programs
  • Assist with the development, revision, and maintenance of Standard Operating Procedures and Working Instructions related to IT Security
  • 5 years IT security administration, Unix, NT including 3 years IT security management / engineering experience or network systems administrator with security experience
12

Cyber Security Architect Resume Examples & Samples

  • Maintain development security standards, policies, and procedures
  • Perform on-going security code and testing review to improve software security
  • Perform security risk analysis for products and portfolio
  • Contribute to all levels of the architecture, and maintain security documentation
  • Develop a familiarity with new tools and best practices
  • Update, maintain, and deploy new training programs for staff
  • Develop and deliver consistent automated metrics covering aspects of the security program
  • Responsible for compliance status for all components in each major release, and for the security assurance of the components
  • 5+ years proven work experience as a software security engineer
  • Excellent communication skills and organizational savvy, project management experience a plus
  • Familiarity with vulnerability and threat management techniques
  • Strong familiarity with multiple software security paradigms, and CISSP, CISA, OSCP or other information security certifications
  • Working knowledge of all vulnerability classes on the OWASP Periodic Table of Vulnerabilities
  • Strong software development background with experience in Java J2EE and Java script
  • Experience with Enterprise Cloud Software environments preferred
  • Knowledge of web related technologies (Web applications, Web Services and Service Oriented Architectures) and of network/web related protocol
  • Detailed technical knowledge of techniques, standards and state-of-the art capabilities for authentication and authorization, applied cryptography, security vulnerabilities and remediation. Understanding of attack vectors, exploits, and hacking tools
  • Experience with various security tools and products (Fortify, AppScan, Burp Suite)
  • Background in hospitality industry, computer software development and experience working with POS/IFC/PMS/S&C systems a plus
13

Principal Cyber Security Architect Resume Examples & Samples

  • Bachelor's degree in Information Systems, Information Technology (IT), Computer Science or Software Engineering from an accredited university or college (or a high school diploma / GED with a minimum of 8 years of information systems secure design, implementation, or integration)
  • A minimum of 10 years of experience in Software Engineering involving secure product design,
  • Proven experience in product management to deliver business value and drive
14

Cyber Security Architect Resume Examples & Samples

  • Review, analyze, and evaluate both internally developed software and vendor products and procedures to address security requirements
  • Responsible for the evaluation of new technologies, tools, and/or development techniques that impact security
  • Drive the software security certification process for the organization. Coordinate and manage the process interfacing with the corporate security and cloud operations organizations
  • Hands on experience with encryption, cryptographic standards, communication protocols, security standards and vulnerabilities
  • Detailed technical knowledge of techniques, standards and state-of-the art capabilities for authentication and authorization, applied cryptography, security vulnerabilities and remediation
  • Understanding of attack vectors, exploits, and hacking tools
15

Cyber Security Architect Resume Examples & Samples

  • Design and development of point and enterprise-wide security solutions to meet current and emerging threats
  • Create and maintain security designs and patterns
  • Integrate architectural features and patterns into existing infrastructures while maintaining the integrity and security of enterprise-wide systems and networks
  • Collaborate with business areas and IT architects to ensure proper security is considered throughout the organization
  • Apply security standards, directives, guidance and policies to an architectural framework
  • Provide architectural analysis of security features and relate existing system to future needs and trends
  • Support vulnerability, threat and incident efforts as needed
  • Proven Experience in Cloud, IoT and Mobile technologies required
  • Experience integrating Security into SDLC preferred
  • Familiar with architectural documentation standards required
  • Proficient in key areas of security such as: Vulnerability management, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption, Two‐Factor Authentication, Web‐filtering, and Advanced Threat Protection
16

Cyber Security Architect Resume Examples & Samples

  • Four (4) years of continuous experience within the Information Technology field
  • Two (2) years of cumulative experience in network or security design review on information systems in an organization with at least 1,000 employees
  • An Associate degree in computer science, information assurance or related field from an accredited college or university whose accreditation is recognized by the U.S. Department of Education or the Council for Higher Education Accreditation (CHEA) or foreign equivalent
  • Expert knowledge level on computer networking fundamentals
  • Intermediate knowledge level of how system components are installed, integrated, and optimized
  • Intermediate knowledge level of industry-standard and organizationally accepted analysis principles and methods
  • Expert knowledge level of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth)
  • At least one of the following professional Level-2 certification as defined by the Department of Defense 8570.01-M Information Assurance Workforce Improvement Program such as Security+, GSEC, SCNP, SSCP, CISSP, CASP, CCNA-Security, CISM, or GSLC
  • A Bachelor's degree or higher in computer science, information assurance or related field from an accredited college or university whose accreditation is recognized by the U.S. Department of Education or the Council for Higher Education Accreditation (CHEA) or foreign equivalent
  • At least one of the following computing environment certifications, Certified Risk and Information Systems Controls (CRISC), Global Information Assurance Certifications – Certified Intrusion Analyst (GCIA) or, Certified Incident Handler (GCIH), or EC-Council Certified Security Analyst (ECSA)
  • IT Security expertise in ICS/PCD environments
  • Relevant architectural experience and knowledge at the global enterprise level
  • Understanding of 'Next Gen' ICS solutions
  • Experience architecting and implementing SIEM, AV, Web Content Filtering, DLP, IDS/IPS, and Vulnerability Management solutions
  • Experience (or familiarity) with SANs ICS and NIST 800-82 R2 concerning industrial control systems
  • Experience in network security audits and compliance monitoring for wireless devices, modems, encryption systems, IT cyber security policies, programs, standards and procedures
  • Knowledge of encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES)
  • Skill in applying and incorporating IT technologies into proposed solutions
17

Cyber Security Architect Resume Examples & Samples

  • Maintain an up-to-date understanding of industry best practices, and monitor the legal and regulatory environment for developments that could require changes to established policies, standards, and practices
  • Recommend and implement controls to protect the systems environment from threats that can result in a breach of confidentiality of the organization's valuable information, or unauthorized changes to production system data
  • Develop an organization capability to perform compliance verification activities including measurement, verification, validation, evidence analysis and reporting of enterprise compliance with cyber-security policies, technical security control requirements, security risk assessment and application security
  • Monitor and report on the performance of IT security control activities across multiple platforms and diverse system environments
  • Provide oversight and management of Service Organization Control Examinations in accordance with AICPA requirements (SOC 1 SSAE 16, SOC 2 AT 101, SOC 3 AT 101), as well as other audits conducted by external audit firms, agencies and third parties
  • Provide on-going monitoring of system security controls to insure that systems, users and personnel are in compliance with security objectives, policies, and procedures
  • Engage internal and external stakeholders to identify strategic intelligence gaps in vulnerability, IT risk and threat management, and develop innovative solutions to close identified gaps
  • Review and perform analysis of threats that create a risk to the company, its employees, assets and clients and present findings to leadership
  • Provide guidance to organizations regarding current information security threats and recommendations to address those threats
  • Understanding of network architecture and concepts, application architecture, and interoperability of these architectures with one another
  • Demonstrated ability to conduct risk assessments, audits and reviews
  • Possess knowledge of application security controls and awareness of top security considerations for application development in the Software Development Lifecycle
  • Excellent analytical and data gathering skills
  • 5-year direct experience with vendor and managed security services management, enterprise wide transition and transformation programs
  • 5-year direct experience with providing in-depth information security technical advisory and recommendations to external and/or internal clients relating to the technology services, security standards and policies and industry best practices
  • 2 – 3-year experience in managed security services and/or advisory services to customers in Financial services, Tax, and/or Healthcare industry
  • 2 – 3-year experience in developing and implementing Enterprise IT security strategy, and compliance programs
18

End Point, Cyber Security Architect GBS Resume Examples & Samples

  • Support EUC endpoint security program maturity of security in the following categories: Global endpoint security system management, anti-virus solution, encryption management solution, intrusion detection, and all others applicable under scope of endpoint protection
  • Lead EUC endpoint security program to ensuring compliance to standards, policies, and procedures; conducting incident response analyses
  • Support Security team in conjunction with company's software architecture group, to develop a set of architectural and development standards for all endpoint security
  • Provide direct support to business units as a center point of contact for EUC resolution related to endpoint protection
  • Support and improve technical security awareness training for software architects and development groups
  • Support the Security processes and Standards with internal and external teams to ensure legacy and newly deployed applications and hardware deployed securely
  • Lead internal Security research, reviews and POCs of operating systems and applications for compliance with policy, industry standards and manufacturer recommended security baselines
  • Support the project planning, documentation and testing of security systems internally developed and implemented
  • Responsible for Production Operations of McAfee ePO and associated production management of products that use ePO to administer policy, which may include the McAfee Agent (MA), HIPS, Encryption, Data Loss Prevention (DLP), VirusScan (VSE), and all other products under McAfee
  • Centrally manage and own the structure hierarchy for McAfee-related settings using ePO servers
  • Develop processes and capabilities to support decentralized ePO management where required
  • Accountable for setting a standardized framework across all ePO environments (tags, policies, configuration settings, etc.)
  • Provide maintenance for ePO managed products to maintain compliance, including DAT files, patch updates and upgrades
  • Support an Agile and DevOps approach to ePO management and maintenance, including support for deployment and management automation, version controls, and related continuous integration, delivery, and management processes
  • Support IT Emergency Response during emergency events
  • Troubleshoot complex issues related to incidents and document associated KBs
  • Support security incident response in information gathering and analysis efforts
  • Support security engineering and architecture personnel to assure security architecture, design, and implementation is in accordance with Intel requirements
  • Comply with change and configuration management processes for all changes to production environments
  • Develop and maintain compliance reports
  • Create and deliver lifecycle management documentation
  • Minimum of 5+ years-of demonstrated experience in architecting, providing solutions and managing endpoint security solution (i.e. Mcafee suite of products and Epo)
  • Direct experience with leading senior technical advisory and governance body, relating to the endpoint technology services, endpoint security standards and policies and industry best practices
  • Minimum of 2+-year hands-on experience leading large scale deployment to end users (device roll-out, security solutions, etc.…)
  • 5+ years of hands-on experience leading or supporting large enterprise malware protection solutions using products such as Mcafee (preferred) or other enterprise software security providers
19

Senior Cyber Security Architect Resume Examples & Samples

  • Create long-term cyber security architecture strategy for the North America zone as part of AB InBev’s strategic IT plans
  • Set cyber security architectural standards and ensure that new services and systems are implemented in-line with AB InBev security standards
  • Provide input into strategic cyber security plans and help drive alignment with application teams, business, systems implementers
  • Ensure that project delivery teams and systems implementers are familiar with AB InBev’s cyber security strategy and know how to deliver solutions in-line with standards
  • Evaluate new Global solutions and provide recommendations on how to integrate into NA Zone landscape
  • Overall responsibility for the strategy and benefits related to quality of services during all project phases and make sure services are transitioned to the appropriate support organizations (internal and external)
  • Work with project delivery teams to track and report all aspects of project delivery using metrics that represent benefits, quality, budget and timeline
  • Develop, manage, and contribute to short-term planning and long-term strategy to deliver application initiatives that meet Business needs, including innovation where appropriate and while maintaining a flat or declining service cost
  • Build and maintain relationships with major technology suppliers to continuously explore opportunities to increase the business value of products and services received
  • Develop and manage productivity improvement initiatives within cyber security
  • Work with delivery teams to ensure applications are delivered and supported cost-effectively and that total cost is defined for specific initiatives
20

Cyber Security Architect Resume Examples & Samples

  • Technical Integration
  • Architecture
  • ICT Consultancy
  • Testing
  • Client Focus
  • Team working
21

Enterprise Cyber Security Architect Resume Examples & Samples

  • Manages a technical team of architects who work across business units and technology domains within Nextera, including power generation, transmission, distribution, and energy trading
  • Leads security technology innovation and builds security technology roadmaps, tech evaluations, point of contact (POC) approaches and overall integration /handoffs to engineering and operational teams
  • Performs new technology and third-party risk assessments, and consults with other technology leaders to quantify risks of technology adoption
  • Develops Cyber Security program strategic vision and defines the operational technology, infrastructure and application security architectures, problem anticipation and tradeoff analysis across the landscape
  • Establishes and implements the cyber security strategic planning operating mode--facilitating the program strategy, linkage to projects, funding and workforce planning
  • Interfaces with internal and external contributing organizations/companies, relative to technical requirements, directions, and problem resolution
  • Leads change across large platforms / functional areas, using technology solutions
  • Experience: 7+ years
  • Bachelor's - Information Systems
  • Supervisor/Management Experience: 6+ years
22

Lead Cyber Security Architect Resume Examples & Samples

  • Define the cyber security architecture including setting overall vision and direction
  • Document, prototype and implement security architecture
  • Work alongside electronics hardware and software engineers and with IT, acting as the security advisor and providing guidance on security architecture
  • Maintain state of the art knowledge on best practices for design of secure systems, latest threats and countermeasures by reading industry communications and attending events
  • Plan and implement the security test strategy
  • Work with third parties to challenge our secure design principles, for example through independent reviews, penetration testing, vulnerability assessment, etc
  • Bachelors or Masters degree in Software Engineering, Electronics Engineering, Computer Sciences or similar
  • Minimum 5 years of hands-on software development experience including embedded software
  • Minimum 2 years of experience specifically in design and architecture of secure systems. A background in connected products is highly desirable
  • In-depth knowledge of a range of network and wireless communications technologies, for example physical Ethernet, 3G / 4G, 802.11, etc
  • Demonstrated successful security platform design and implementation
  • Good understanding of software and hardware threats and weaknesses
  • Completely up to date with latest developments and best practices in the field. This will include knowledge of: design principles for secure connected products, standards, assessment of vulnerabilities and threats, cryptographic methods for combined hardware / software system e.g. symmetric and asymmetric encryption, certificate and key management, etc
  • Ability to work in a dynamic and fast pacing environments with a Can Do attitude (no challenge is too difficult)
  • Hands on - Start-up mentality, dynamic, independent
23

Cyber Security Architect Resume Examples & Samples

  • Assists Security Operations and Security engineering teams with high level architectural and engineering questions, analysis, and design
  • Work with senior staff (technical and business) and subject matter experts to document current security products/practices (endpoint security, MDM, Device AuthN, IDM, Network security, Monitoring/Operations, Incident management, Application security, encryption, Anti-Virus, IPS/IDS, Firewalls, etc.) requirements and architecture, research best practices, conduct trend analysis, and identify gaps in developing future-state designs and specs
  • Create white papers and other internal documentation highlighting industry best practices for information security in technology development and applications
  • Follows Information Security process, policies and procedures congruent with standards and industry best practices
  • Minimum of 5+ years experience with direct responsibility for hands on architecture, design, development and deployment experience of security technologies
  • Experience with multiple information technology and security technologies: IIS, SQL, firewall, IPS/IDS, Windows, Linux, Anti-Virus, mail filtering, WAF, encryption, CA authority, IDM/IAM, multi factor authentication, SSO, VPN, Vulnerability Management, DDoS, SIEM, FIM, WIPS, MDM, Pen Testing, etc. Hands on experience managing an array of security tools (e.g. Web Content Filtering, Malware, Firewalls, Intrusion Protection, etc
  • Ability to write security requirements and design documents
  • Ability to analyze complex problems and recommend/negotiate solutions
  • Bachelor’s degree in Computer Science, Information Systems, Network Security Engineering or related major or equivalent work experience
  • Current SANS certification holder (technical tracks) strongly preferred
  • Security Certifications desired, CISSP, CISA, CPISM, ISSAP, OSCP, OSWP. Other industry certifications preferred, CCNA, CCNP, CCIE, MCSE, CCSA, CCSE, CCSM
  • Application or software security certifications are preferred, such as CSSLP, GIAC GWEB/GSSP-Java/GSSP-.NET, etc
24

Cyber Security Architect, GBS Resume Examples & Samples

  • Supervise and/or conduct security due diligence assessments of new and existing third party providers
  • Provide technical and business support for third-party enterprise penetration testing programs including scheduling, report generation, coordination activities and executive-level enterprise reporting
  • Strong expertise in guiding business units and IT operations to strengthen their implementation and effectiveness of the security controls in a very fast pace, complexity, and demanding environment
  • Develop innovative technology and software-based solutions to enhance analytical efficiencies/quality
  • Conduct IT risk assessments of new products and processes. This includes the identification, quantification, prioritization and escalation of risks to ensure that all risk categories are managed in accordance with the organization’s risk appetite
  • Understanding of computer and network forensics, system and network security, incident management, intrusion detection, vulnerability and patch management, log analysis, and related technologies
  • 3 years direct experience with vendor and managed security services management, enterprise wide transition and transformation programs
  • 5 years direct experience with providing in-depth information security technical advisory and recommendations to external and/or internal clients relating to the technology services, security standards and policies and industry best practices
  • 2 – 3 year experience in developing and implementing Enterprise IT security strategy, and compliance programs
  • 3 – 5-year hands-on experience in reviewing technology projects in a security, risk and security controls advisory role providing recommendation to address such risks and/or enhance the technical controls
25

Prin Cyber Security Architect Resume Examples & Samples

  • Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results. Ensure appropriate implementation of security technology and reference architectures within both the development and production environments. Analyze user needs and requirements to plan architecture
  • Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements. Provide input on security requirements to be included in statements of work and other appropriate procurement documents
  • Provide technology and security expertise and advice to IT leadership in the development of strategic security technology and plans to support business strategies. Translate proposed capabilities into technical requirements
  • Establish, maintain, and enhance relationships with business and IT partners. Communicate status to key stakeholders on a regular basis
  • Maintain awareness of trends and issues in area of security expertise, evaluate new security technologies or technology opportunities, and provide analysis of their potential impact to advantage the business
26

Senior Cyber Security Architect Resume Examples & Samples

  • Reviewing architecture and design from a security and compliance standpoint ensuring deployments meet or exceed best practices for information systems security and control
  • Supporting BlackBerry internal technology teams
  • Participation in project teams of varying scope and complexity
  • Be outgoing, enthusiastic, and comfortable working with small and large teams
  • Professional with experience on consulting, designing and delivering large projects/programs
  • Experience with physical security concepts, best practices and relevant controls
  • Experience in any of the following areas would be highly desired: Data Leakage Prevention (DLP), Mobile Security, Mobile Threat Management, Endpoint Forensics, Vulnerability Scanning
  • Experience designing audit programs and/or responding to auditors is desirable
  • CISSP, CRISC, CISA, CISM, GSEC, or similar certification
27

Cyber Security Architect Resume Examples & Samples

  • Experience mentoring and coaching others
  • Active Top Secret security clearance required
  • CISSP-ISSEP and/or CISSP-ISSAP certifications
  • 20 years of IT experience, with 15 years of dedicated IASAE experience
  • Experience with security management, informatino security risk assessments, information security engineering, network security management, application design and architecture, network engineering
28

Cyber Security Architect Resume Examples & Samples

  • Drive efforts with the development teams to quantify residual product risk and identification of appropriate security controls
  • Bachelor’s degree in computer science or software engineering, or equivalent
  • 8+ years of software development with at least 4 years in developing secure systems
  • Understanding of Agile software development practices
29

Cyber Security Architect Resume Examples & Samples

  • Accountable for the design of complex security systems, integration of those systems into myriad operational products, hosting environments
  • Also accountable for correctly identifying security vulnerabilities with 100% accuracy, then designing and executing on remediation plans involving the acquisition, design, test, integration, and implementation of advanced security tools
  • Assist development and operational teams in the appropriate application of security best practices and the use of advanced security technologies
  • Assist in the implementation of security solutions and ensure their integrity
  • Internally recognized as highly competent in security areas, will review and participate in benchmarking, installation, upgrade, configuration, deployment and testing activity
  • Investigate innovative approaches to improve software security
  • Familiarity with industry changes in security standards, information management, development standards, methods and emerging 3rd party security software in order to advise on security and leverage industry best practice in the design and construction of Allscripts software products
  • Support day to day technical control of security projects by assisting Project Management in planning technical aspects of projects
  • Provide regular updates on project status
  • Support and mentor individual junior members of the team
  • Perform detailed security reviews to ensure design components are being securely implemented
  • In concert with other security architects within Allscripts create a center of expertise and forum for common security design and reuse
  • Participate in the definition and documentation of security standards and best practices
  • B.S. in Computer Related Field required
  • 7+ years relevant experience in the IT/Security industry
  • Experience software architecture, design, and development is desired
  • Professional certifications such as CISSP, CEH, or OSCP are highly desired
  • Demonstrable understanding of security principles and methods, technologies, and standards
  • Understanding of OWASP or CWE vulnerabilities along with their exploits, risks, and mitigations
  • Highly motivated in creating business value through the effective use of technology
  • Experience in building systems to comply with HIPAA, Meaningful Use, DEA EPCS, and other healthcare regulations
30

Cyber Security Architect Resume Examples & Samples

  • Must have experience facilitating architecture sessions to develop enterprise security architecture that fits within clients existing environment
  • Must be knowledgeable on a broad range of security technologies, have experience helping stakeholders navigate these security requirements
  • Must under how to translate business objectives into broader technical objectives and associated security strategies
  • Must understand the pros and cons of different security technologies and where they are generally applied
  • Must have a strong understanding of security processes and how they fit into a typical IT organization
  • Must have extensive experience with large enterprise resilience
  • Exposure to recovery in virtualized environments including Cloud technologies, Wintel and Unix/Linux Infrastructure IT environments, software defined networks and Wide Area Network (WAN) principles
31

Enterprise Cyber Security Architect Resume Examples & Samples

  • Define security strategy and plans to enforce security and identify threats
  • Review design and architecture of application from security concepts such as Confidentiality, availability and Integrity
  • Review Code reviews (Java, Web services, Rest APIs, .net, SQLs, JavaScript’s) to ensure that secure coding is done to implement security concepts Confidentiality, availability and Integrity
  • Review log files, data correlation & analysis from various security devices to identify potential security related risks
  • Review design and architecture of network , infrastructure , topology for securing applications to maintain confidentiality, integrity and availability of Telematics applications
  • Review and define security test cases for critical components
  • Define security policies and procedures
  • Investigate security incidents and provide detailed report on the incident
  • Involve in security audit and compliance and provide the technical details
  • Adopt security technologies and security design practices to make application more secure
  • Recommend and influence new and improved security architecture best practices and processes
  • Conduct proof-of-concept projects to adopt new technologies that will keep technology leadership
  • Must possess minimum of 10 years of experience in cyber security
  • 7 years of hands-on experience in security architecture and secure coding
  • Advanced knowledge of Security architecture concepts
  • Understanding of network, cloud and application architecture and concepts, and interoperability of these architectures with one another
  • Reasonable experience and basic understanding of HIPAA/PCI and how it relates to an IT organization in terms of cyber security and risk
  • Solid understanding of performing a risk assessment and establishing a risk treatment plan
  • Experience in Secure Communication & System Integration Technologies & Methodologies
  • Experience in security gateway like layer 7 or IBM Data power
  • Experience in SQL for Oracle DB and NoSQL is preferred
  • Experience in firewall, IDS, and IPS tools and log files
  • Strong Analytical and Problem Solving Capabilities
  • Verbally capable to communicate directly with senior management and subject matter experts through presentations and discussion
  • Ability to Collaborate and Engage well with others to solve problems and actively incorporate input from various sources
  • Possess excellent business acumen with a strong ability to map business requirements to security solutions
  • Possess strong written and verbal communication skills, proven presentation skills to all levels of audience including technologists, management and executives
  • CISSP, SSAP, SCF, CISSP, CRISC certification will be helpful
  • Will be willing to take risks, will anticipate the consequences of decisions and will generate plans to address them. Will be willing to go against the grain, will have courage to take calculated risks and will have the ability to present his/her point of view in a positive and effective manner
  • Will have the ability to effectively leverage diverse resources. Will work hard to foster positive relationships and will develop win-win solutions when conflicts arise. Will build relationship by making self highly approachable, will seek input from others and will actively listen to concerns and alternate points of view, will make others feel valued and supported
32

Senior Cyber Security Architect Resume Examples & Samples

  • Document and disseminate security requirements relative to risk
  • Manage red team engagements
  • Keep operational Security Design and other security documentation current. Develop security requirements for Continuous Integration, DevOps and Continuous Delivery
  • Assist in the construction and use of tools to automate operational security alerts
  • Define security architecture for 2020 where AWS will be our sole data center
  • Work closely with other technical organizations to build in security
  • Ensure process documentation is complete and up to date
33

Cyber Security Architect Resume Examples & Samples

  • Manage the Flight Avionics UK security activities – scope, budgets, schedule and risk elements with respect to guidelines and strategy define by the Security Design Authority
  • Work with the projects developing the Thales Avionics UK products, to ensure that security is designed into the products and the security work is tightly integrated with the development work
  • Be responsible for taking Thales Avionics UK products through security certification, particularly achieving airworthiness security certification. This will include performing security risk assessments, defining product security measures, producing security documentation and ensuring the required security assurance of the product can be demonstrated to satisfy the certification authorities
  • Implement product security standards, policies (administrative, safeguards, technical), processes (compliance, incidents, testing) and mechanisms (data at rest, in motion, in use) from risk analysis up to security requirements definition, support to integration & validation of security functions, pentesting capacities organization with third parties
  • Coordinate with the Security Design Authority to ensure a common approach to security and that security good practice is shared
  • Co-ordinate, understand and potentially represent Thales UK in the standards bodies defining the aviation security processes and mechanisms
  • Maintain awareness of current vulnerabilities, response mechanisms, mitigation strategies, new technologies, trends, innovations and the changing aviation cybersecurity threatscape
  • Communicate internally regarding critical cybersecurity incidents impacting the solution or product sub systems, and where appropriate, summarize for external communication 24x7x365 as needed
  • Responsible for continuous evolution of value-added cybersecurity into solutions and Reserch & Technology roadmaps
  • Assess cybersecurity capabilities within Thales Avionics UK and develop and execute plans to increase cybersecurity awareness and expertise within the organization
  • Represent Thales Avionics UK cybersecurity in coordination with Thales internal counterparts to achieve compliance to group security standards
  • Domain knowledge in cybersecurity principles, risk assessment, testing, risk, risk mitigation and threat response
  • Previous experience in cybersecurity solutions implementation in a product domain
  • Demonstrated leadership behaviors: shaping solutions out of complexity, ambitious and accountable, perform through cooperation, influence key stakeholders, engage and develop teams
  • Strong presentation and written communication skills and effective interaction, internal and external, with all levels of management
  • Coordination and protection of critical, confidential and sensitive information spanning multiple parties
  • Strong critical thinking and analytical skills with pragmatic and prioritized actions
  • Develop metrics to measure effectiveness and efficiency and deploy actions to reach agreed target levels
  • Proven experience in information security, risk management or engineering
  • Experience of the aviation industry is required, in particular an appreciation of Aviation Industry security processes and practices (ED202/DO-326, etc) would beneficial
  • Leadership experience in a dynamic, matrixed, corporate environment
  • Certified Information Systems Security Professional (CISSP) is desirable
34

Senior Cyber Security Architect Resume Examples & Samples

  • Responsible for ensuring necessary security controls are part of technical designs
  • Facilitates project handoffs including preparing documentation, educating and supporting to ensure smooth transitions
  • Continually works to enhance breadth and depth of knowledge and experience
  • Benchmarks technology strategies and architectures
  • Monitors and anticipates trends and investigates organizational objectives and needs
  • Promotes implementation of new technology, solutions and methods to improve business processes, efficiency, effectiveness and value delivered to customers
  • GuideWell Connect business/technology experience is preferred
  • Web Services Security
35

Cyber Security Architect Resume Examples & Samples

  • Provide high-level systems architectural expertise to managers and technical staff
  • Review and assess target architectures and infrastructure components from technical and operational effectiveness, efficiency, security, and risk perspectives
  • Provide gap analysis based on assessment and determine actions to address shortfalls
  • Provide support to design, test, and accredit target infrastructure components
  • Recommend and test mitigation strategies
  • Assess interoperability of system architectures and nodes
  • Recommend automated tools to assess future upgrades
  • Assess applications and systems for Cloud environment readiness and advisability
  • Develop architectural products and deliverables for the enterprise and operational business lines
  • Develop strategy of system and the design infrastructure necessary to support that strategy
  • Advise on selection of technological purchases with regards to processing, data storage, data access, and applications development
  • Set standards for the client/server relational database structure for the organization (SQL, ORACLE, SYBASE, etc.)
  • Advise management with respect to feasibility of potential future projects and technologies
  • Address problems related to system integration, compatibility, and multiple platforms
  • Resolve problems with software, systems, configurations, and virtualization and provide recommendations for improvement and enhancement
36

Senior Cyber Security Architect Resume Examples & Samples

  • Reviews existing security architecture, identifies design gaps, and recommends security enhancements
  • Stays abreast of current and emerging security threats and designs security architecture to mitigate them
  • Ensures alignment between security architecture frameworks, standards and overall business strategy
  • Serves as an information security expert and trusted advisor to partners in technical and non-technical business units
  • Develops and maintains cybersecurity standards to meet compliance requirements and to ensure effective management of cyber risks
  • Develops and provides strategic blueprints and roadmaps on cybersecurity capabilities to solutions architects
  • Represents department in Enterprise initiatives and planning; and assist with technology strategic roadmap development while ensuring cybersecurity capabilities & technical controls are incorporated
  • Collaborate and drive key requirements through governance bodies: Architecture Review Board, Technology Review Board, Data Governance and Information Risk Related committees
  • Strong background in IaaS, PaaS, SaaS architectures with demonstrated experience in supporting design and migration strategies
  • Working knowledge of TOGAF and SABSA methodologies for creation of baseline and target architectural blueprints
  • 7 years’ experience with Secure Application Development (Enterprise, mobile, web apps) using Hybrid Cloud – On Premise and the Public Cloud. Familiar with where security needs to be supplemented when higher security is required
  • Skilled in Container and Microservice Technologies, AWS or Azure Security, Cloud Security Alliance Control Matrix expert
  • Deep insight into Cloud - IAAS and PAAS Security Controls (AWS, Azure, GCP, VMware, etc.)
  • IAM: Authentication, Authorization, MFA, Federation with Active Directory
  • Infrastructure Security and Integrity: Infrastructure Segmentation, Operating Systems and Application Repository, Server Security - Secured Enhanced Linux (RHEL), File Integrity / Data Tamper Monitoring, Network/Security Monitoring
  • Experience with Hardening the infrastructure, Baseline Device Hardening: OS, VM, and Mobile Device Hardening to ensure Confidentiality, Integrity and Availability (CIA)
  • Skilled with Encryption: Data-at-Rest and Data-in-Transit, Security Policy Enforcement Points
  • Experience with one or more general purpose programming languages including but not limited to: Java, C/C++, C#, Objective C, Python, JavaScript
  • Detailed understanding of and experience with application deployments in corporate environments l
  • Experienced with Threat Modelling tools for Enterprise, mobile and web apps
  • Understands Static Code Analysis, Dynamic Code Analysis, Penetration testing and has helped companies remediate coding vulnerabilities and issues
  • Perform security related services and process assessments and evaluations based on NIST, OWASP, NIST, PCI-DSS, CWE/SANS, CSA guidelines
  • Authentication and Password Management, Session Management, Access Control, Input Validation, Output Encoding, Cryptographic Practices, Error Handling and Logging, Data Protection, Communication Security, System Configuration, Database Security, File Management, Memory Management, General Secure Coding Practices
  • Cloud and Container Technologies (Docker) – SaaS, IaaS, PaaS
  • Web Application security, Vulnerability management: Application Firewalls, SEIM, Anti-Virus
  • Data Loss Prevention (DLP), FIM, Secure coding and configuration standards
  • VPN technologies such as PKI, IKE, IPSEC, SSL/HTTPS and digital certificate
  • Information security practices: PCI-DSS, ITGC’s, HIPAA and Privacy
  • Certifications: CompTIA Security+, CompTIA CASP, GIAC Certifications (GCIA, GCIH, GMON, GPPA or GCED) or equivalent experience required, EC-Council (CEH, ECSA, CHFI), Cisco CCIE or equivalent experience
37

Cyber Security Architect Resume Examples & Samples

  • Cyber and Information security/risk/incident analysis to support the front line defence of networks, protecting information from unauthorised access and violations. By analysing and assessing potential security risks, developing plans to deal with such incidents by putting measures in place to mitigate cyber threats
  • Preparation of technical reports and risk analysis reports
  • Planning, coordination and supervision of external penetration testers used to carry out tests on public facing systems
  • Contribute to the management, development and oversight of the enterprise wide vulnerability scanning service for business as usual and project activities.Execute computer forensics analysis or investigations as required, coordinating activities with the esure Fraud team or external partners or organizations
  • Contribute to the design and delivery of an Information Security strategy and framework and map - aligned with overall IT and Business strategy/direction
  • Ensure the delivery of all IT security operational services provided by Capgemini or other third party providers
  • Responsible for working with other areas of IT and the business to identify priorities, put in place security solutions, standards and policies in the interests and benefit of the business
  • Responsible for managing relationships across the business and ensuring that key Cyber security messages are delivered and managed
  • Contribute to the delivery of the esure’s information & Cyber security improvement programme, including the implementation of policies, standards and procedures
  • Application and enforcement of esure information security policies
  • Third party risk assessments including occasional external due diligence visits
  • Contribute to the promotion of information & Cyber security awareness and education throughout the organisation
  • Maintain a high level of knowledge relating to the current Cyber threats and advise internal teams (IT & Business) as required
  • Provide oversight of esure IT Systems and technical controls, providing regular security reviews to ensure that risk controls are functioning correctly and that use of the company’s systems and processes is conforming with industry security standards
  • Proven experience within a Cyber and Information Security team
  • Proven experience of business stakeholder management and communication
  • Experienced in following and implementing Cyber & Information Security regulatory standards and policies
  • Proven technical experience: investigation, analysis, support roles, various non-IT contributors
  • Experience of vulnerability management, penetration testing and ethical hacking
  • Strong risk assessment skills covering both risk identification and documentation
  • Architectural understanding of cloud services extending to administration and audit capabilities e.g. Amazon Web Services
  • Possible experience in Security Architecture insight or exposure and the development of Security governance aligned to Data and Enterprise Architecture
  • Experienced in creating and following formal governance processes as set out by an IT department for change, risk, issue and operational management
  • Proven experience of influencing and motivate people, both with and without direct authority, to achieve project objectives
  • A strong security focus, with a good understanding of business priorities and IT drivers and the ability to make strategic decisions
  • Highly effective written and oral communication skills
  • Industry Cyber security certifications such as CISSP
38

Lead Cyber Security Architect Resume Examples & Samples

  • Be the Expert that defines, analyzes and ensures proper implementation of cyber security in software architectures for Safety and Productivity Solution’s products
  • Drive substantial revenue growth in cyber security strategies to create value
  • Provide technical leadership, guidance, and assistance to development teams in implementation of cyber security strategies and designs, and participate in building the cyber security vision and roadmap
39

Senior Cyber Security Architect Resume Examples & Samples

  • Owns and maintains a holistic view of the information security capabilities and technology services by creating and maintaining architecture blueprints illustrating current and future state services and flows
  • Leads strategic enterprise security architecture definition based on business requirements, risk management practices, and IT strategies; define or approve, when necessary, modifications to the security architecture to accommodate business needs
  • Assess strategic & near-term security needs, using a blended approach with the Cybersecurity Framework and ISO 27001, to align security priorities; consult with leadership, system engineers and system architects to develop solutions; provide assessment of options, risks, costs vs. benefits, and impact on other capabilities, processes and priorities
  • Contribute to the enterprise reference architecture models (creation, maintenance, governance)
  • Ensure all solution security architecture design and analysis work within the standard architecture documentation is documented and included in the architecture repositories
  • Provides consulting support to projects during the vision and strategy, architecture, and development phases
  • Provides input in identifying issues and guides vendor selection for cybersecurity
  • Provides leadership and work guidance to peers and less experienced personnel
  • Responsible for the evaluation of emerging projects and applications for an IT Security perspective
  • Manage security and compliance requirements with other departments, providing support, and technical expertise
  • Maintain a professional communicative relationship with internal customers and management to provide information throughout the incident
  • 7+ years of overall IT professional experience
  • Must have good judgment, problem-solving and decision-making skills
  • Strong skills and experience in processes reengineering and optimization
  • Understanding of controls (e.g. access control, auditing, authentication, encryption, integrity, physical security, and application security)
  • Must be well versed in operating systems such as Linux as well as Windows environments, Active Directory, VPN systems, encryption schemas and algorithms, various authorization and authentication mechanisms/software, network monitoring and sniffing, TCP/IP networks and vulnerability and threat management tools (including network based scanners)
  • Experience and knowledge of NIST
  • Advanced Security certifications (CISSP, CRISC, CISM, CISA, TOGAF, or similar certifications desirable)
40

Cyber Security Architect Resume Examples & Samples

  • Expert level working experience in technologies like, Server Security, DLP, SIEM, WAF, Perimeter Firewall
  • Have handled customer project for implementation/Migration of security controls on virtualized/cloud environment
  • High level experience on CSA CCM / NIST / PCI /HIPAA Control mapping
  • Experience on architecting compliance driven (PCI, HIPAA, etc.) security controls for applications on AWS leveraging AWS IAAS, PAAS services
  • Understanding and Product exposure on leading CASB solutions in market like Skyhigh, Cisco Cloud lock, Netskope, Symantec blucoat/ELastica etc
  • Experience on NG Firewall, DLP for application hosting in AWS, Azure or other cloud
  • Exposure to Web Application Firewall migration / Integration projects and integration of heterogeneous Networks/Services/systems would be an added advantage, Log collection and analysis
  • Performs analysis and diagnosis of complex security problems
  • Prepare implementation, migration plan and risk mitigation strategy for Web Application Firewalls technologies
  • Ability to provide detailed network Security drawings and diagrams and relation as-built documentation
  • Requirements gathering / analysis to enable project team to understand functional / technical requirements
  • Contribute to system / functional architecture analysis and Participate in solution identification and implementation
  • Worked closely with customers, project managers and other engineers to develop customized Security solution
  • Leading the Technical team and offshore and onsite co-ordinations
  • Work closely with the Project Manager in project planning, status reporting and ensure adherence to SLAs
41

Lead Cyber Security Architect Resume Examples & Samples

  • At least seven 7 years of experience as a Cyber Security Engineer, or Systems Design Architect with a demonstrated track record in the development and deployment to production of increasingly more complex solutions
  • Ability to lead cross-functional teams
  • Working knowledge of networking concepts and communication protocols
  • Working knowledge of Architecture concepts and frameworks
  • Working knowledge of systems integration
  • Knowledge of secure design and implementation of the below technologies with concentration on at least one of the below
42

Cyber Security Architect Resume Examples & Samples

  • Develop security architecture and guiding principles to support information technology initiatives with a focus on cloud
  • Drive, influence and coordinate a secure approach to the development of solutions across the enterprise
  • Deliver deep technical guidance related to enhancing the security posture information technology solutions
  • Participate in the security governance model, establishing policies, standards and best practices
  • Proactively address changes in the external threat landscape that have an impact on the use of on-premise and cloud computing technologies
  • Assist with the integration of security into cloud services delivery standards
  • Oversee and drive the design and implementation of security architecture controls in support of compliance requirements
  • Bachelor’s degree in Computer Science or Business Administration, or relevant educational or professional experience
  • 5+ years of experience in IT infrastructure related field
  • 3+ years of enterprise information security architecture and information security system design
  • Experience integrating security into cloud solutions desired
  • Experience with Azure and/or Amazon Web Services (AWS) security preferred
  • Experience developing cloud security vision, strategy and roadmap preferred
  • A background in general security practices such as identity and access management (IAM), encryption, and multi-factor authentication, security information and event management (SIEM), and others
  • Security certifications such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hack (CEH), or Certified Cloud Security Professional (CCSP) desired
  • Knowledge of cyber security standards and frameworks such as ISO 27001 or NIST 800-32 desired
43

Cyber Security Architect Senior Mgr Resume Examples & Samples

  • Demonstrated security architecture knowledge and expertise
  • In depth knowledge of industry leading security and infrastructure solutions
  • Demonstrated experience with large enterprises and enterprise architecture
  • Demonstrated ability to develop architecture and strategies that address the interdependencies between infrastructure, platform, and application capabilities across a heterogeneous environment
  • Ability to assess new technology, associated risks, and risk mitigations
  • Demonstrated strategic thinking skills
  • Excellent relationship builder with demonstrated ability to team across functions and businesses
  • Strong interpersonal skills with the ability to influence others to gain support
  • Strong decision maker who can manage polarities
  • Demonstrated business acumen and ability to anticipate needs and drive success
  • Team player, willing to share knowledge/information with team members
  • Demonstrated effective interpersonal skills (written and oral)
  • Ability to communicate effectively in a virtual environment
  • Demonstrated experience in problem solving
  • Ability to follow a methodical development and implementation process
  • Excel at delivering impactful approaches that provide a balance between information security and business needs
  • Demonstrated experience with lead architectural role in program deliverables
  • Demonstrated knowledge of information security, identity and access management, authentication services, network infrastructure and end-point security
  • Demonstrated experience and in-depth architectural understanding of Active Directory and associated services
  • Demonstrated experience and knowledge of platform security and management functions for Windows, UNIX, and Linux operating systems
  • Demonstrated experience with enterprise network infrastructure and horizontal integration across core enterprise services
  • Familiarity with associated governmental and agency directives, regulations, and controls
  • CISSP or other security certifications - Incident Response, Forensics experience - STRIDE, DREAD experience - External conference presentation and published paper experience/skills
  • Demonstrated expertise in systems engineering processes
  • Demonstrated experience in enterprise risk management
  • Active SCI Clearances
44

Senior Cyber Security Architect Resume Examples & Samples

  • Track, research, understand, and provide guidance on technology changes, advances, and improvements
  • Work with internal engineering and operations teams and Program Security Organization to identify security gaps, areas of improvement, service/process enhancements related to tools use, integration, data extraction
  • Work with customers (internal and external) to capture, and clarify customer needs
  • Develop solutions, using existing service models, to support customer requirements
  • Support solution implementation by providing teams with information about design aspects and ensuring implementations correctly meet requirements
  • Track product vendor releases help service owners understand and plan for vendor release cycles
  • Maintain product data in existing product tracking database
  • Bachelor’s Degree in Computer Science, Engineering or related technical discipline and 9 years of related IT experience OR Master's Degree and 7 years of related IT experience, an additional 4 years of related experience may be substituted in lieu of degree
  • Demonstrated experience working with diverse levels of technical and non-technical staff
  • Experience with Office product, specifically Excel, Word, Visio
  • Ability to work closely with customers and cooperatively with a cross-functional team and ensure delivery on time and within budget
  • Ability to analyze and resolve customer issues efficiently
  • Strong written & verbal communication skills along with presentation skills
  • Experience identifying and evaluating security products and toolsets that provide enterprise services in a complex IT environment
  • Gap Analysis and Remediation by identifying requirements unmet by current products or services and recommendations for addressing requirement gaps
  • Maintenance and update of the technical test tools and capabilities, to incorporate new techniques that support a mission-ready capability, including updating documentation and training to reflect the current state of requirements, methodologies, tools, and processes
  • Working knowledge of relevant hardware and software applications, including emerging technologies
  • Participation in technical design reviews, system integration testing, load testing, and user acceptance testing
  • Excellent writing and technical documentation skills
  • Excellent planning, organization, scheduling and progress reporting skills
  • Excellent teamwork skills to collaborate with a diverse team of skilled systems engineers
  • Excellent communications skills to articulate complex technical issues
  • Architecture experience/certification (e.g. CEA/TOGAF/DoDAF)
  • MS in Engineering/Computer Science/Information Systems/Information Security
45

Lead Cyber Security Architect Resume Examples & Samples

  • Provide guidance on the security technology aspects from network and architecture level to embedded levels for Harman’s core platform technologies, for customer engagements during RFx and program execution process throughout the product life cycle
  • Support RFx activities with Business Development team on security-requirements analysis and lead threat analysis for potential projects
  • Perform Threat Assessment , analyze attack vectors, review security requirements, systems and software architectures from a security standpoint and provide guidance for required implementation for Harman’s core technology and strategic projects
  • Articulate secure systems for software and hardware development and circulate thru the Customer Program (CPM) and Center of Competence (CoC) teams
  • Work with fellow Cyber Security Architects to define security requirements for cross-functional teams in developing systems
  • Define specs for security testing and acceptance criteria ,Define routine code analysis checks, establish policy for fuzz testing and functional security testing and Review policy adherence throughout lifecycle
  • Through Harman’s SDL Process, review technical security details of the products used in Harman systems, both hardware and software
  • Define requirements and technical solutions to meet platform specific software security solutions
  • Review new security technologies, help select third party suppliers, and create solutions to effectively mitigate security theats/risks
  • Will have to solve complex cyber security challenges balancing between requirments, state of the art security technologies and cost
  • Participate and represent Harman Automotive Cyber Security in various technical organizations like – SAE, IEEE etc
  • At least 10 years as a security architect for embedded systems
  • At least 5 years of hands-on experience in either implementation of security mechanisms or reverse engineering of embedded systems
  • Experience in software project mangment
  • Experience in applied cryptography and design of crypto-based mechanisms
  • Experience in handling various HW platforms and various operating systems
  • Experience in working in a global corporate with diverse technology teams and customers
  • Ethical hacker certification - an advantage
  • Experience in the automotive industry - an advantage
  • Experience in code design concept and measures for automotive systems from network, architecture level - an advantage
  • Be able to collaborate with other technical teams and customers
  • Good interpersonal skills and communication with teams and customers
  • Goal, quality and deadline oriented