Cybersecurity Architect Resume Samples

4.9 (113 votes) for Cybersecurity Architect Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cybersecurity architect job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
UV
U Vandervort
Unique
Vandervort
77507 Fisher Springs
New York
NY
+1 (555) 517 1661
77507 Fisher Springs
New York
NY
Phone
p +1 (555) 517 1661
Experience Experience
Phoenix, AZ
Cybersecurity Architect
Phoenix, AZ
Bogisich, Kutch and Hamill
Phoenix, AZ
Cybersecurity Architect
  • Lead operational, line of business, and engineering functions to develop, review and approve proposed security strategies and frameworks
  • Facilitate organizational change by defining strategies for the firm with respect to technology domain standards and design goals
  • Provide technical design and architectural leadership, including documenting and diagramming the logical, physical, and process views
  • Communicate leading industry practices by giving presentations, working with project teams, and authoring content aimed at educating others about standards, strategies, and otherwise defined leading practices
  • Conduct research focused on identifying emerging technology solutions that reduce costs, increase efficiencies, provide more value, provide more capabilities, reduce risks, and increase security
  • Knowledge of major Cybersecurity vendor solutions in the market
  • 1) Tracks and creates mitigation plans to eliminate any outstanding cybersecurity findings
Los Angeles, CA
Senior Cybersecurity Architect
Los Angeles, CA
Mayer Inc
Los Angeles, CA
Senior Cybersecurity Architect
  • Creating assessment reports providing analysis of vulnerabilities and providing remediation and mitigation recommendations to the software coding team
  • Designing and developing new systems, applications and solutions and system integration for enterprise wide cyber systems and networks
  • Applies new and innovative ideas to old or new problems. Fosters environments that encourages innovation. Contributes to and supports effort to further build intellectual property via patents
  • Works to and is an advocate to ensure compliance for security best practices including but not limited to the following coding standards, design, platform, cloud and network specific design concerns
  • Possibly work with big data, metrics and data analytics tools to help manage large volumes of security reporting systems
  • Work with the CIO organization and business units to promote security engineering practices and develop security reference architectures for new solutions
  • Responsible for designing and developing new systems, applications and solutions and system integration for enterprise wide cyber systems and networks
present
Detroit, MI
Principal Cybersecurity Architect / Engineer
Detroit, MI
Boehm and Sons
present
Detroit, MI
Principal Cybersecurity Architect / Engineer
present
  • Directs teams of technical, professional and management staff in the successful fulfillment of IS&C development and risk management commitments
  • Manages the establishment of individual and organizational objectives that are aligned with organization goals
  • Directs the implementation of improvement (mitigation) initiatives
  • Identifies risk opportunities to make IT and business processes more effective and efficient
  • Facilitates the execution of overall CES-21 objectives in alignment with company strategic vision and plans
  • Scope the assessment of risks and the execution of plans to mitigate the risks
  • Directs risk-based prioritization activities for security within technology roadmaps
Education Education
Bachelor’s Degree in Business
Bachelor’s Degree in Business
University of Florida
Bachelor’s Degree in Business
Skills Skills
  • High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
  • Good cultural orientation and clear articulation of the value contribution and acknowledgement by key stakeholders
  • Good knowledge of IT Project Management
  • Excellent knowledge of IT Project Management
  • Ability to design, create and deliver solution frameworks
  • 11) Strong verbal and written communication
  • Demonstrated senior leadership skills with the ability to manage large geographically and/or functionally dispersed teams
  • Ability to handle competing priorities, and seeking consensus when stakeholders have different or even contradicting opinions
  • Ability to lead and motivate technical communities
  • Knowledge of OWASP, SDLC, Encryption, Identity and Access Management, data integrity measures
Create a Resume in Minutes

15 Cybersecurity Architect resume templates

1

Cybersecurity Architect Resume Examples & Samples

  • Lead operational, line of business, and engineering functions to develop, review and approve proposed security strategies and frameworks
  • Facilitate organizational change by defining strategies for the firm with respect to technology domain standards and design goals
  • Manage applicable standards and procedures translating security requirements into easily understood controls
  • Communicate leading industry practices by giving presentations, working with project teams, and authoring content aimed at educating others about standards, strategies, and otherwise defined leading practices
  • Conduct research focused on identifying emerging technology solutions that reduce costs, increase efficiencies, provide more value, provide more capabilities, reduce risks, and increase security
  • Provide firmwide and line of business executive level updates as required
  • Prior progressive IT experience with experience as an architect delivering enterprise solutions in technology domain
  • Hands on experience with large scale enterprise identity and access management systems
  • Prior work experience with global enterprise I&AM (preferred)
  • Hands-on experience implementing Identity management/User Provisioning, Web Single Sign-On, Enterprise Single Sign-On, Enterprise Role Management, Entitlements Management, Federated Identity Management and Information Security Management
  • Experience with leading vendor Identity and Access Management suites such as Oracle, IBM, Sun, CA and Courion required
  • Experience with implementing web front-end technologies including HTML, Javascript and CSS (preferred)
  • Experience with scripting and/or development tools used with application integration (preferred)
  • Excellent written and communication skills required
2

Principal Cybersecurity Architect Resume Examples & Samples

  • Completes concise presentations to each department ensuring that IT department objectives and missions are understood
  • 10+ years technical experience in information security
  • Familiar with SABSA Architecture Framework
  • Understanding of programming concepts (SQL, Java) is a plus
3

Senior Cybersecurity Architect Resume Examples & Samples

  • Work collaboratively across multi-disciplinary teams throughout the company as a security expert
  • Engage in security review and consultation during the design and implementation phases of new projects. Align these project efforts with company policy, industry best practices, and regulatory mandates as applicable
  • For both enterprise projects and on-going engineering efforts, identify potential risks and suggest remediating controls
  • Develop reference security architectures (including requirements, design patterns, and other artifacts) for use throughout the company
  • Mentor security members and other areas of the company regarding security concepts and architecture
  • Research current security trends and conduct technology forecasts, and perform gap analysis against current security posture
  • Provides multi-tier support to all departments and maintains mutually beneficial relationships with vendors to ensure appropriate support of all business activities
  • Education Level: Bachelors Degree in Information Sciences, Technology or Equivalent
  • 7+years technical experience in information security
  • Experience in networking (TCP/IP)
  • Experience working with network devices and server workstations
  • Familiar with standards such as NIST, PCI
  • Certifications: CISSP, CISM (preferred)
4

Principal Cybersecurity Architect / Engineer Resume Examples & Samples

  • 10+ years of experience in enterprise security architecture and operational technology / industrial control systems security
  • 10+ years of designing and implementing infrastructure architecture
  • Experience working in multi-stakeholder contexts and representing organizational interests
  • Strong interpersonal, organizational, and leadership skills
  • Experience with technical R&D programs a plus
  • PG&E experience within the related line of business
  • Expert understanding of information security concepts and strategy
  • Demonstrated strategic planning and road mapping ability
  • First class documentation skills
  • Establishes clear plans for engagement and is accountable for partnership with technical leads across the CES-21 parties
  • Facilitates the execution of overall CES-21 objectives in alignment with company strategic vision and plans
  • Provides technical oversight of vendors on PG&E tasks, ensuring that deliverables are in line with PG&E’s stated vision and technical requirements
  • Maintains strategic level of expertise in the areas of technology, threats, and mitigation techniques to ensure PG&E tasks are appropriately leveraging industry knowledge and research
  • Directs risk-based prioritization activities for security within technology roadmaps
  • Proactively provides expert knowledge of industry trends and technologies as it relates to specific opportunities where security can enhance value to the business and/or addresses a specific business need
  • Ensures technology risk-based investment planning through risk-integration with BTLs
  • Identifies risk opportunities to make IT and business processes more effective and efficient
  • Directs the implementation of improvement (mitigation) initiatives
  • Manages the establishment of individual and organizational objectives that are aligned with organization goals
5

Expert Cybersecurity Architect / Engineer Resume Examples & Samples

  • M.S. or M.B.A. degree in business administration or computer science
  • 3+ years of experience in enterprise security architecture and operational technology / industrial control systems security
  • Minimum of 2 years leadership experience over an IT function
  • 3+ years of designing and implementing infrastructure architecture
  • Have a deep understanding of the ICS security and threat environment
  • Ability to lead meetings and project teams
  • Ability to define and execute technical vision with multiple stakeholders, and socialize concepts and projects across a variety of domains
  • Demonstrated experience managing technical teams to successfully deliver IT services
  • Understands information security holistically and how it relates to business goals
  • Understanding of risk assessment and risk analysis frameworks
  • Highly collaborative, able to work cross-functionally; possessing the ability to forge relationships and partner effectively
  • Resourceful and self-motivated, able to work independently when required
  • Credible and persuasive; able to present often complex information in an accessible fashion to a non-technical audience
  • Demonstrated ability to manage individuals
  • Experience with enterprise security in a complex, multi-platform environment including SCADA and other complex technology platforms
  • Experience with regulatory requirements
  • Defines overall success in PG&E’s respective areas of task implementation
  • Leads technical subject matter expert discussions and articulates overall vision for development of PG&E task deliverables
  • Provides direction, review, and support for all inputs and outputs of the project deliverables
  • Establishes external industry leadership through multiple industry affiliations, partners with other IOUs to share information, and works with federal, state, and local government entities (including national labs) in coordination with regulatory affairs in proactively and responding to inquiries
  • Directly accountable for communicating security vision, strategy, planning and leadership for the design, development, implementation and support of technology risk management framework for a line of business to achieve its objectives
  • Ensures successful implementation of security into new/enhanced systems to meet scope, schedule, and budget
  • Scope the assessment of risks and the execution of plans to mitigate the risks
  • Oversees compliance to standards/regulations and governance processes as it relates to the line of business
  • Directs teams of technical, professional and management staff in the successful fulfillment of IS&C development and risk management commitments
  • Ensures staff has the resources and skills needed to support all work initiatives
6

Cybersecurity Architect Resume Examples & Samples

  • 1) Tracks and creates mitigation plans to eliminate any outstanding cybersecurity findings
  • 2) Contributes towards the execution and maintenance of a cybersecurity risk acceptance process
  • 3) Develops and documents cybersecurity policies for medical devices
  • 4) Provides subject matter expertise in establishment of cybersecurity awareness and communication strategy
  • 5) Serves as a cybersecurity liaison to interface with legal, compliance, privacy, and audit organizations
  • 6) Assists in the documentation of FDA medical device premarket submissions for effective cybersecurity management
  • 7) Provides cybersecurity technical guidance to other technical personnel
  • 8) Identifies and implements process improvements in the architecture and/or infrastructure of existing systems in the area of cybersecurity
  • 9) Remains up to date on new and emerging technologies within area of technical expertise and serves as resource to other Baxter employees
  • 1) Experience working in a cybersecurity risk management organization
  • 2) Experience in the following: creation of cybersecurity policies and standards, execution and design of cybersecurity risk acceptance processes
  • 3) Knowledge of major cybersecurity frameworks and control methodologies such as NIST, COBIT or ISO 27001
  • 4) Competency with IT GRC tools
  • 5) Strong understanding of cybersecurity control objectives
  • 6) Technical expertise and/or breadth in one or more systems environments and strategic technologies
  • 7) Ability to work effectively in a team environment
  • 8) Maturity to accept direction, confidence to give direction
  • 9) Proven record to deliver results
  • 10) Demonstrated problem solving, critical thinking and logical structuring skills
  • 11) Strong verbal and written communication
7

Cybersecurity Architect Resume Examples & Samples

  • Will also develop technical publications regarding software and hardware implementations and must be able to think and perform with minimal guidance once direction from management is given
  • Typically requires a bachelor's or master's degree in computer science, information technology or related field and nine or more years of progressive experience in cybersecurity with a bachelor's or seven or more years with a master's. Equivalent professional experience may be substituted in lieu of education
  • Requires the ability to implement DoD Risk Management Framework technical and non-technical requirements
  • Previous experience with the following technologies is required: Linux, Windows, Cisco, Security+, CISSP
  • Diversity in technical knowledge and skillsets with ability to adjust to various external processes driven by customers is nice to have
  • The ability to balance system functionality and security with mission accomplishment as their driving impetus is preferred
8

Cybersecurity Architect Resume Examples & Samples

  • Maintain a strong relationship with the customer (COR) based upon frequent meetings and interactions which are characterized by attention to Customer “Must haves” and the co-development of a shared vision for the program’s future
  • Instill a customer-focused attitude within the workforce and encourage the power of ideas as a cornerstone of innovation which pervades the program
  • Provide high level technical interaction with U.S. Government stakeholders
  • Participate in technical meetings, Change Control Boards, Engineering Review Boards, and System Security Working Group (SSWG) meetings to address issues related to computer security and vulnerabilities
  • Apply knowledge of current IA policies, to include structures, roles major organizations, to identify and correct shortcomings in the structure
  • Leads evaluations of program and system vulnerabilities as they relate to security and development programmatic or procedural countermeasures necessary to protect program operations
  • Incorporate all security disciplines, recommend and develop requirements, specifications, designs, and procedures to satisfy program security policy and planning guidance
  • Monitor the implementation of security requirements for facilities and systems
  • Develop reports, information, and recommendations that support the implementation of client security requirements
  • Prepare, write, and present reports and briefings as required
  • Directs staff in the conduct of risk, vulnerability, and threat assessments in support of security policy validation
  • Will receive direction from the IA Lead
  • BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering. Experience may be used in lieu of a degree. Master’s Degree highly desired
  • Must have a current DoD Secret security clearance, and may be required to obtain a higher security clearance and successfully complete a Counter-Intelligence Polygraph
  • Must have a minimum of 10 years of experience
  • Experience with the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and DoDI 8510.01 “Risk Management Framework (RMF) for DoD Information Technology (IT)” in support of ship delivery
  • Experience with US Navy or US Coast Guard
  • Familiarity with DoDD 8140.01 “Cyberspace Workforce Management”
  • Familiarity with IEEE Standard 15288
  • Experience with DoDAF
  • Demonstrated experience with the DoD AAA Certification and Accreditation process, leading to successful Interim Authorization to Test (IATT) and Authorization to Operate (ATO)
  • Three (3) years demonstrated experience in cyber security to include practices/methodologies, associated technologies, application design, and/or experience in an operational environment, to include monitoring and security event analysis, management of vulnerability assessments, security engineering, cyber intelligence support, and intrusion analysis
  • Demonstrated ability to manage multiple teams in a dynamic environment
  • DoDI 8570.1-M Compliance at IAT Level II
  • Extensive experience supporting USN or USCG Customers
  • Extensive experience with cyber security development projects and programs for U.S. Government and/or commercial clients
  • Extensive experience with six or more of the following
  • Security COTS integration
  • Operating System Hardening
  • Cross Domain Solutions
  • Computer Network Operations (CNO)
  • DoDI 8570.1-M Compliance at IAT Level III
9

Cybersecurity Architect Resume Examples & Samples

  • Experience working in cybersecurity threat intelligence organizations
  • Competency with security event monitoring tools and techniques
  • Subject matter expertise in cybersecurity event analysis including requirements, design, architecture and operations
  • Maturity to accept direction, confidence to give direction
  • Creativity in addressing technical challenges
  • Technical expertise and/or breadth in one or more systems environments and strategic technologies
  • Ability to understand and assist in evolution and/or integration of Baxter applications
  • Strong oral and presentation skills
  • Proven record to deliver results
  • Knowledge of major cybersecurity frameworks and control methodologies such as NIST, COBIT or ISO 27001
10

Cybersecurity Architect Resume Examples & Samples

  • Develop or identify new concepts, tools or systems to improve the overall security posture of the organization
  • Works with the CIO organization and business units to promote security engineering practices
  • Researches information security trends, standards and practices to identify needs for enhancing security solutions
  • Identifies security requirements by evaluating business needs and technical requirements and relate them to required/desired security controls
  • Pilot / test new security solutions in limited deployment to evaluate and recommend for large-scale deployment
  • Acts as an advisor and business enabler to project teams seeking guidance on security practices and controls to support secure solution design
  • Articulates problems related to the security solution being developed and requests review and guidance to minimize risks associated with the proposed solution
  • Analyzes problems and suggests solutions involving business, I/T technology, methodology, process, tools and solution components
  • Accepts ownership of tasks, is able to independently drive to completion and seek guidance of more senior team members as needed
  • Participate actively in knowledge sharing activities like communities of practice, forums, conferences and/or other knowledge exchanges to improve security architect/engineering practices
  • At least 3 years hands-on experience with common, enterprise grade IT and Security technologies from major vendors (IBM, Cisco, Juniper, Symantec, BlueCoat, Palo Alto, FireEye, HP, Microsoft, etc.)
  • Applied knowledge of TCP/IP networking, network services/protocols (ssh, syslog, tls, etc...) and network design principles
  • Applied knowledge of Operating Systems (e.g. Linux, Unix, Windows) and Windows Services (e.g. Active Directory, LDAP, etc)
  • Prior experience in one or more of the following: cloud security, mobile device security, application security, security operations, incident response
  • Experience using Agile within project or development teams
  • Certifications: CISSP, CISSP-IASSP, SANS GIAC ( e.g. GCIA, GCIH, GPEN), DoDD 8140, Networking (CCNA, CCNP with Security)
11

Senior Cybersecurity Architect Resume Examples & Samples

  • Leverage Agile practices to develop or identify new concepts, tools or systems to improve the overall security posture of the organization
  • Work with the CIO organization and business units to promote security engineering practices and develop security reference architectures for new solutions
  • Identify security requirements by evaluating business needs and technical requirements and relate them to required/desired security controls
  • Research information security trends, standards and practices to identify needs for enhancing security solutions
  • Lead projects to pilot / test new security solutions in limited deployment to evaluate and recommend for large-scale deployment
  • Lead design and deployment of new security solutions across the corporate enterprise
  • Act as a subject matter expert and business enabler to project teams seeking guidance on security practices and controls to support secure solution design
  • Articulate problems related to the security solution being developed and requests review and guidance to minimize risks associated with the proposed solution
  • Analyze problems and suggests solutions involving business, I/T technology, methodology, process, tools and solution components
  • Accept ownership of tasks, is able to independently drive to completion and seek guidance of more senior team members as needed
  • Participate actively in knowledge sharing activities like communities of practice, forums, conferences and/or other knowledge exchanges to improve security architure/engineering practices
  • At least 5 years direct architectural experience designing and deploying security technologies
  • At least 5 years hands-on experience with common, enterprise grade IT and Security technologies from major vendors (IBM, Cisco, Juniper, Symantec, BlueCoat, Palo Alto, FireEye, HP, Microsoft, etc.)
  • Applied direct experience with TCP/IP networking, network services/protocols (e.g. ssh, syslog, tls, etc...) and network design principles
  • Applied direct experience with Operating Systems (e.g. Linux, Unix, Windows) and Windows Services (e.g. Active Directory, LDAP, etc)
  • Knowledge of consulting techniques, roles, and responsibilities in providing technical or business guidance to clients
  • At least 7 years direct architectural experience designing and deploying security technologies
  • At least 7 years hands-on experience with common, enterprise grade IT and Security technologies from major vendors (IBM, Cisco, Juniper, Symantec, BlueCoat, Palo Alto, FireEye, HP, Microsoft, etc.)
  • At least prior experience performing ongoing maintenance and operations of security technologies (e.g. management of firewalls, IDS/IPS, endpoint security, etc)
  • Knowledge of both US and non-US security requirements related to regulations/standards such as ISO27001, PCI-DSS, SOX, FFIEC, HIPAA, privacy laws, etc
  • Experience leading Agile teams within project or development teams
  • Certifications: CISSP, CISSP-IASSP, SANS GIAC ( e.g. GCIA, GCIH, GPEN), DoDD 8140, Networking (CCNP/CCIE with Security)
12

Cybersecurity Architect, Mid Resume Examples & Samples

  • 5 years of experience with providing in-depth information security technical advisory and recommendations to external or internal clients for technology services, security standards and policies, and industry best practices
  • 3+ years of experience with reviewing technology projects in a security, risk, and security control advisory role, including providing recommendations that address such risks or enhance technical controls
  • 2+ years of experience with managing security services or advisory services for customers in the financial services, tax, or healthcare industry
  • 2+ years of experience with developing and implementing enterprise IT security strategy and compliance programs
  • Experience with developing and implementing Information programs and IT security policies, standards, processes, and procedures
  • BA or BS degree in CS or MIS required
13

Cybersecurity Architect, Lead Resume Examples & Samples

  • 10+ years of experience with providing in-depth information security technical advisory and recommendations to external or internal clients on technology services, security standards and policies, and industry best practices
  • 10+ years of experience with managing security services or advisory services to customers in the financial services, tax, or healthcare industry
  • 10+ years of experience with developing and implementing enterprise IT security strategy and compliance programs
  • 10+ years of experience with reviewing technology projects in a security, risk, and security controls advisory role providing recommendation to address such risks and/or enhance the technical controls
  • Experience with working in a coalition environment with multiple nationalities and cultures a plus
  • Experience with working in the Middle East a plus
  • Experience as an Arabic speaker a plus
  • MA or MS degree in CS or MIS a plus
14

Cybersecurity Architect Resume Examples & Samples

  • 10+ years of strong hands-on experiences and technical depth in one, or more technology areas, including Data security, Infrastructure security, Endpoint/Platform security, Security Analytics, and Application Security
  • Software development experience in one or more languages (scripting/functional/imperative – iOS/Android, HTML2,C/C++, Java, Python, Scala, R)
  • Hands-on experience with application integrity validation, root and jailbreak, code obfuscation, SE/TEE, Touch ID, cert pinning, webview integrations, and SDKs
  • Experienced with threat modeling of mobile solutions and digital consumer experiences
  • Experience and thought leadership with designs for highly secure / trusted computation environments
  • Strong written and verbal communication skills – experienced in communicating risk to both technical and non-technical audiences
  • Hands-on experience with penetration testing
  • Familiarity with compliance such as GLBA, FFIEC, OCC Bulletins, Red Flags, PCI, ISO 27001
15

Senior Cybersecurity Architect Resume Examples & Samples

  • At least 9 years direct architectural experience designing and deploying security technologies
  • At least 9 years hands-on experience with common, enterprise grade IT and Security technologies from major vendors (IBM, Cisco, Juniper, Symantec, BlueCoat, Palo Alto, FireEye, HP, Microsoft, etc.)
  • Prior experience performing ongoing maintenance and operations of security technologies (e.g. management of firewalls, IDS/IPS, endpoint security, etc)
16

Cybersecurity Architect Resume Examples & Samples

  • Author Industry level standards and guidelines to guide the deployment of technologies
  • Represent Schneider Electric in standards bodies or consortia related to cybersecurity as required
  • Assist the Industry CERT team as required to analyze issues
  • CISSP or equivalent certification, CSSLP in addition is desired
  • 5+ years' experience in development and deployment of security into a product offer
  • 2+ years in architecture or lead developer role on secure products / security features
  • Experience in or applying security to the majority of the following areas: Cloud security, Software Defined Networking, Virtualization, trust relationships from chip to application, PKI systems, code analysis
  • Experience in embedded systems, control systems, network components, PC software, web applications with an industrial focus is highly regarded
17

Cybersecurity Architect Resume Examples & Samples

  • Review, analyze, and report on emerging technologies and their effect on the cybersecurity posture of Baxter Medical Devices
  • Develop cybersecurity requirements for various medical devices
  • Provide cybersecurity design recommendations for various products and technologies
  • Architect, design, implement, assess, and support advanced and diverse cybersecurity technical solutions that address complex business requirements
  • Serve as a cybersecurity subject matter expert for various projects
  • Provide cybersecurity technical guidance to other technical personnel
  • Manage cybersecurity technical components of large projects
  • Evaluate and recommend products and systems in key technology areas
  • Work cooperatively with technical personnel in other divisions and functions to accomplish enterprise-wide goals
  • Identify and implement process improvements in the architecture and/or infrastructure of existing systems in the area of cybersecurity
  • Remain up to date on new and emerging technologies within area of technical expertise and serves as resource to other Baxter
  • Experience designing technical security control solutions to address cybersecurity requirements for products and services
  • Experience in the following: computer architecture, operating systems, imbedded systems design, inter and inner process communications, networking protocols and their related implementations
  • Experience with and understanding of compiled and interpreted programs and the types of security issues possible in each; database systems, web servers, application servers, firewalls, routers, load balancers, switches, and different types of middleware
  • In-depth hands-on experience in the following technologies
18

Cybersecurity Architect Resume Examples & Samples

  • BS and 10 years of broad IT experience in information security, information systems, or related field of study
  • 8+ years Cybersecurity related experience
  • Experience in managing projects larger [> $100k] requiring highly-skilled and diverse integrated project teams to include multiple simultaneous activities or projects
  • Must be able to obtain a Position of Public Trust Clearance
  • Must be a US Citizen or Permanent Resident (Green Card holder) as per our contract requirements
  • Must not have traveled outside of the US for more then a combined 6 months total in the last 5 years
  • Must have lived in the United States for the last 5 years
  • Position is based in Washington DC and/or Northern Virginia and does not offer relocation assistance
  • Outstanding organizational and oral and written communications skills
  • Ability to provide detailed reporting
  • Certifications such as CISSP or other security certifications i.e. CEH, ISSAP/ISSMP, CRISC, SANS
  • Familiarity with building and designing enterprise security strategies and roadmaps
  • Experience integrating heterogeneous operational security technologies
  • Experience with Enterprise Security Architecture
  • Experience in standards frameworks CVSS, ISO, NIST, ITIL, etc…
  • Prior USPS experience
  • Active USPS Clearance
19

Autonomous Cybersecurity Architect Resume Examples & Samples

  • Leverage industry standards and best practices for the purposes of assessing the current “as-is” architecture
  • Propose the desired “to-be” architecture based on solid risk assessment and evaluation of available technology and controls
  • Evaluate IT systems, appliances, and devices being proposed for use within the environment and their ability to meet GM’s security requirements, recommending mitigating controls for identified limitations and risks
  • Work closely with the other GCC PPDO, GM IT Enterprise Architects and outside vendors to ensure security requirements are addressed in all phases of project lifecycles
  • Assist in the creation and maintenance of enterprise security policies, controls, and standards for technologies defined within the GM taxonomy
  • Provide security architecture as a service in assistance to project teams and other architecture groups to ensure proper skills are applied where needed
  • Assist in identifying and assessing risk as part of the overall Risk Management process
  • Understand and apply the distinction and dependencies between business, information, systems and technology architecture layers
  • Use proven experience-based ability to design and develop IT solutions based on defined requirements in a large-scale multi-national organization
  • Evaluate and select various technologies for suitable inclusion in IT solution designs
  • Develop and comprehend abstract models of IT solution architectures, including various views of solution architectures
  • Review and contribute to the definition of functional and non-functional business requirements and translate these into clearly articulated architectural requirements in the context of the required solution
  • Participate in the discovery, documentation and refinement of business requirements to ensure alignment with technically viable solution designs
  • Document applicable assumptions related to the technical viability of defined and reviewed solutions
  • Validate these assumptions as needed to ensure solution appropriateness
  • Validate current and future state architectural models and views as necessary to ensure availability of a thorough and robust comprehension of the assigned domain
  • Participate in technical incident management and troubleshooting as needed
  • Understand and apply software engineering and application development methodologies in a complex multi-project environment
  • Bachelor degree in Computer Science, Computer Engineering, Information Systems, or equivalent field/work experience
  • 3+ years of experience in Information Systems Security
  • 5+ years of experience in IT architecture creating key artifacts including architectural principles, requirements traceability, use cases, patterns, reference architectures, elaboration, and network designs and drawings
  • 5+ years of experience in creation of IT solutions including enterprise-level systems (web, client/server, and mobile applications, networks and endpoint devices)
  • Demonstrated experience in developing contextual and conceptual, logical and physical architecture deliverables
  • Solid experience based knowledge and ability to apply the principles of application or infrastructure architectures, including the distinction between contextual, conceptual, logical and physical layers
  • Must demonstrate the ability to make recommendations and influence decisions based risk reduction
  • Must demonstrate the ability to work constructively as an individual or in groups with minimal supervision
  • Technical Master’s degree strongly preferred
  • Certified Information Security Systems Professional (CISSP) certification
  • Experience in providing security solutions for APIs or 4G LTE infrastructure
  • Experience with mobile and application security including WiFi, BLE etc
  • Desire to continuously learn and keep up to date on latest developments within information security
  • Ability to conduct evaluations of alternative proposals to security architecture andred Qualifications: facilitate decisions ensuring the best outcome for the GM IT and business environments
  • Ability to conduct fact-based evaluations of architecture alternatives, mediate opposing viewpoints and negotiate equitable outcomes that ensure stable solutions
  • Career track record of engineering, developing (coding), deploying and maintaining business critical information technology solutions across a range of technical platforms
  • Solid experience in strategic planning and project management
  • Solid understanding of the SDLC process and ability to effectively develop and design solutions using a structured approach
  • Demonstrated experience in using industry standards such as ISO/IEC 27001 and 27002, COBIT, and TOGAF
  • CEH, GCIH, GPEN, GWAPT, CISM, CISA, CGEIT or CRISC certifications
20

Senior Cybersecurity Architect Resume Examples & Samples

  • Maintain Information Systems per DoD Security Technical Implementation Guides (STIGs), and provide deployed support to information systems
  • Maintain security baseline configurations and documents for multiple Operating Systems and applications
  • Designing and developing new systems, applications and solutions and system integration for enterprise wide cyber systems and networks
  • Ensures system security needs established and maintained for system design and analysis, test and evaluation, system vulnerability, incident response, security risk assessment, certification and accreditation and other cybersecurity related issues
  • Typically requires a bachelor's or master's degree in computer science, information technology or related field and nine or more years of progressive experience in cybersecurity with a bachelor's or seven or more years with a master's
  • Must have in-depth and hands on, Systems, Network and Security Administration that aligns with DoD DIACAP and Risk Management Framework
  • The ability to analyze, mitigate and report technical and non-technical risks within the customer’s computing enclave
  • Previous experience administering DoD or similar types of information systems is preferred
  • Must have strong understanding of multiple operating systems and networking
  • Must have the ability to be able to deploy as needed to various locations
21

Cybersecurity Architect for Digital Risk Lead Resume Examples & Samples

  • 7+ years of strong hands-on experiences and technical depth in one, or more technology areas, including Data security, Infrastructure security, Endpoint/Platform security, Security Analytics, and Application Security
  • Hands-on experience with SAML and OAUTH
  • Strength in both business and technical requirements analysis
  • Application design experiences with IOT/Mobile/IOV/external facing APIs
  • Hands-on experience in building prototypes or full products in Cloud-based environments
22

Senior Cybersecurity Architect Resume Examples & Samples

  • Contribute to and/or lead various security architecture review efforts to ensure products include security into design, development and operations
  • Contribute to and/or lead threat modeling efforts against products, tools and enterprise applications that Comcast designs, builds and operates
  • Identify and document security issues
  • Risk rank security issues with product and enterprise teams
  • Stay current with security technologies, trends, vulnerabilities and threats
  • Inform management including business sponsors on security risks and should be able to translate security risks to business impact
  • Work with many teams to support security technology through the product and enterprise lifecycle
  • Author requirements and user stories to include development, integration and operational detail necessary for security
  • Interfaces with many teams across the organization to ensure an efficient and effective security solution meets the business needs
  • Guide threat analysis, technology assurance and technical auditing
  • Works to and is an advocate to ensure compliance for security best practices including but not limited to the following coding standards, design, platform, cloud and network specific design concerns
  • Review third party security technology across multiple platforms and products
  • Support test, troubleshooting and operational issues alignment with security designs and architectures
  • Provide security advice on data security issues, compliance, and privacy requirements such as PCI, CPNI, HIPAA, FCC Regulations, SOX, Subscriber PII, etc
  • Security and technical expertise in cloud technologies such as OpenStack, AWS And Azure
  • Possibly work with big data, metrics and data analytics tools to help manage large volumes of security reporting systems
  • Architected security for products, enterprise, information and other initiatives
  • Proficient at protocols and APIs
  • Proficient at the secure software development lifecycle and devops
  • Proficient at identity, authentication and authorization systems
  • Proficient at understanding cryptographic trust based systems
  • Cloud security knowledge preferred
  • Data and database security
  • Federation, SSO, IDS, IPS, Host Based Firewall, VPN, Wi-Fi, Video, Internet, Voice, DNS, DHCP, HTTPS/TLS, SSH, Key Management, PKI, Tokens, SAML, OAUTH, Fido
  • Knowledgeable in PCI, CPNI, HIPAA, ISO 27001, FCC Regulations, SOX, Subscriber PII, etc
  • Coding experience preferred but not required
  • Excellent written and verbal communication skills, interpersonal and collaborative skills
  • Poise and ability to act calmly and competently in high-pressure, high-stress situations
  • Enjoys working in a demanding, and a very dynamic environment
  • Good natured and positive with people
  • Security expertise in one or more relevant areas
  • Must have strong problem-solving skills
  • Ability to manage multiple projects with strict timelines
  • High level of personal integrity
  • Ability to professionally handle confidential matters, and show an appropriate level of judgment and maturity
  • High degree of initiative and be well organized
  • 8+ years experience in security and technology based industry
  • 5+ years experience working with various security architectures
23

Cybersecurity Architect Resume Examples & Samples

  • 6+ years of experience in supporting DoD customers as a Cybersecurity subject matter expert with an emphasis on providing guidance for the design and implementation of security for enterprise networks, data centers, or commercial Cloud solutions, including SaaS, IaaS, or PaaS
  • 3+ years of experience with enterprise architecture development and implementation and reviewing security architecture artifacts, including Operational Views, Systems Views, or Capability Views
  • 3+ years of experience in working with DoD Cybersecurity policy and instruction, including DoDI 8500, DoDI 8510, DoDI 8530, CJCSM 6510, NIST SP 800–37, NIST SP 800–53 and 53A, NIST SP 800–30, NIST SP 800–122, and CNSSI 1253
  • Experience with reviewing and translating complex network implementations into uniform architectural depictions for leadership
  • Experience with developing and presenting complex technical information for technical and non–technical audiences, including DoD leadership, both orally and in writing
  • Experience with the Department of Defense Architecture Framework (DoDAF)
  • Experience in working with other DoD and national agencies, including ARL
  • Experience with NIST Risk Management Framework
  • Experience with DoD STIGs or a national agency’s capability packages
  • Knowledge of the proper implementation of the following capabilities within a network architecture: firewalls, intrusion prevention or detection systems, Web Content Filter, cross–domain solutions, packet capture, anomalous network behavior detection, security information event management, data loss prevention, session border controller, DMZ, and application whitelisting
  • Certified Ethical Hacker (CEH) or Certified Network Defense Architect (CNDA) Certification
24

Cybersecurity Architect Resume Examples & Samples

  • Provides in debth expertise to Medical device IT security topics
  • Supports medical device projects in secure design and build
  • Supports IT operations responsible for medical devices, including associated infrastructure and services in regards to IT Security
  • Defines medical device IT security related internal standards
  • Solution oriented, can define various pragmatic alternatives leading to appropriate IT security results
  • Reports on medical device security status across company
  • Ensures industry network in regards to Medical device security
  • 10+ years of working experience, 7 of those years with Information Security management
  • Demonstrated leadership skills: >2 years’ experience in senior management positions in a matrix organization
  • 2+ years in the medical device field
  • 5+ years as a senior IT security expert
  • Experience in reporting to and communicating with senior level management (with and without IT background, with and without in depth risk management background) on information risk topics
  • Experience with financial/budget management, scheduling and resource management
  • Excellent understanding and knowledge of general IT infrastructure technology, systems and management processes
  • Proven experience to initiate and manage projects that will affect other divisions, departments and functions, as well as the corporate environment
  • Good mediation and facilitation skills
25

Cybersecurity Architect Resume Examples & Samples

  • Provides in depth expertise to Application Security topics
  • Supports projects in secure application design
  • Contributes to application security related internal standards
  • Identifies major internal application security related deficiencies and suggests pragmatic approaches on how to remediate them at scale
  • Collaborates closely with other Security Architects and IT Architects on Application Security related matters
  • Promotes IT Security culture
  • Solution oriented, can define various pragmatic alternatives leading to appropriate application security results
  • Reports on application security status across company
  • Ensures industry network in regards to Application security
  • 4+ years as a senior software developer
  • 5+ years as a senior application security expert
  • Experienced IT application security architect with broad and in-depth technical, analytical and conceptual skills
  • Experience of sourcing complex IT services, working closely with vendors and making full use of their capabilities
  • Good understanding and knowledge of regulated industries, preferably pharmaceutical industry. Good understanding and knowledge of business processes in a global industry, preferably pharmaceutical industry
  • Experience with compliance requirements (e.g. SOX, GxQ / CSV, E-compliance, Records Management, Privacy)
26

Cybersecurity Architect Resume Examples & Samples

  • Demonstrated senior leadership skills: >8 years’ experience in senior management positions in a matrix organization
  • Experienced IT executive or Corporate Information (or IT) Security Officer with broad and in-depth technical, analytical and conceptual skills
  • Experience in reporting to and communicating with C-level management (with and without IT background, with and without in-depth risk management background) on information risk topics
  • Excellent written and verbal communication and presentation skills; interpersonal and collaborative skills; and the ability to communicate information risk-related concepts to technical as well as non-technical audiences, and to audiences with a risk management profile as well as those with a less outspoken risk management profile
  • Experience with financial/budget management, scheduling and resource management. Design and implementation of new processes or methodologies in complex organizations
  • Demonstrated senior leadership skills with the ability to manage large geographically and/or functionally dispersed teams
  • Excellent knowledge of IT Project Management
  • Experience with compliance requirements (e.g. SOX, GxP / CSV, E-compliance, Records Management, Privacy)
  • Knowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, ISF Standard of Good Practice and ITIL
  • Knowledge of SAP (and general ERP concepts) and experience with typical SAP controls in view of SOX compliance. Preferably also knowledge of SAP GRC
27

Cybersecurity Architect Resume Examples & Samples

  • Compiles and formulates the annual budget and submits them for scrutiny and approval by the IS&RM leadership
  • Manages the IT budgets on a daily/monthly/annual basis. Initiates corrective actions to balance income and expenditure in line with the budgets
  • Produces regular Statements of Accounts for management information and to allow relevant managers to manage their own areas of the budgets
  • Examines and reports on value for money on all major activities, projects and proposed expenditure items for IT
  • Evaluate staffing requirements on a regular basis or upon major changes to the business, operational or IT environments to ensure that IT has sufficient resources to adequately and appropriately support its business goals and objectives
  • Define and regularly review the achievement of individual objectives for each IAM architecture associate
  • Ensure appropriate development of associates through training, career development and coaching
  • Define and identify replacements/backup and succession planning for personnel, and minimize reliance on a single individual performing a critical job function
  • 10+ years of working experience, 7 of those years with combined IT and Information Security management
  • Demonstrated senior leadership skills: >8 years experience in senior management positions in a matrix organization
  • Experience in reporting to and communicating with C-level management (with and without IT background, with and without in depth risk management background) on information risk topics
  • Excellent understanding and knowledge of general IT application technology, systems and management processes
  • Proven ability in security process and organizational design
  • 5+ years of working experience with leading, developing and establishing identity and access management, relevant procedures, programs, and services across a globally diverse environment
  • Experience with working in an outsourced environment
  • Strong knowledge of Oracle IAM suite preferred, but experience of another IAM suite from vendors such as Dell, Sailpoint, IBM, CA is acceptable
  • Formal training and experience in using a relevant enterprise architecture methodology (for example, the Zachman Framework or TOGAF)
28

Cybersecurity Architect Resume Examples & Samples

  • Bachelor Degree and 8 years of hands-on experience in the information security field with expert knowledge of platform, application, storage, data, network, virtualization, cloud and mobile security
  • 2 years of leadership experience with planning and managing security engagements
  • Understanding of enterprise technologies, operations, and architectural principles and models. Knowledge of virtualized data center architectures and operations, SOA-type deployments, mainframe, web services and multi-tier web applications, and WAN/MAN/LAN protocols and technologies supporting intranet, extranet, and remote access services
  • Knowledge of laws, regulations, and standards relevant to the healthcare industry
  • Written and verbal communication skills. Must be able to effectively communicate technical concepts to a non-technical audience
  • Preferred Job Qualifications
  • Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience
  • CISSP certification.IL - Chicago
29

Cybersecurity Architect Resume Examples & Samples

  • Provides in depth expertise to Network Security topics
  • Supports projects where a major deviation is required from secure network standard design
  • Owns network security related internal standards
  • Identifies major internal network security related deficiencies and defines/designed the official pragmatic approaches on how to remediate them at scale
  • Reports on network security status across company and is responsible for maintaining a clear risk acceptance/remediation level and agree to it with CISO and official ISRM governance bodies
  • Ensures industry network in regards to network security
  • Designs and signs off on all network security requirements and official solutions
  • University working and thinking level, degree in business/technical/scientific area or comparable education/experience
  • Professional information security certification, such as CISSP, CISM or ISO 2
  • Fluency (written and spoken) in English
  • 4+ years as a senior network security architect
  • Proven experience to initiate and manage projects that will affect other divisions, departments and function, as well as the corporate environment
  • Good understanding and knowledge of regulated industries, preferably pharmaceutical industry
  • Good understanding and knowledge of business processes in a global industry, preferably pharmaceutical industry
  • Good Knowledge of IT Project Management
  • Deep understanding of network design, datacenter design, perimeter design, LAN design, WAN design, Firewalls, Intrusion Detection Systems, Firewall Rule Management, Deep Packet Inspection, Packet Capture and interpretation of packet capture, Web Application Firewalls, Network based attacks and detection techniques
  • High level of personal integrity and the ability to professionally handle confidential matters, and exude the appropriate level of judgment and maturity
  • Ability to handle competing priorities and seeking consensus when stakeholders have different or even contradicting options
30

Senior Cybersecurity Architect Resume Examples & Samples

  • Determine security requirements by evaluating business strategies and requirements; research information security standards; conduct system security and vulnerability analyses and risk assessments; study architecture/platform; identify integration issues; prepare cost estimates
  • Plan security systems by evaluating network and security technologies; develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices. Design public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software, adhering to industry standards
  • Implement security systems by specifying intrusion detection methodologies and equipment; direct equipment and software installation and calibration; prepare preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation
  • Mobile device security best practices, endpoint posture assessment, device management and cloud integration capabilities
  • Systems architecture, design and operational experience
  • Applied conceptual and analytical thinking, problem solving skills
  • Consulting and partnering skills with enterprise perspective and influence
  • Solid presentation, demonstration and written communication skills
  • At least 8 years of related technical experience
  • Practical experience in the Information Security Architecture field, with emphasis on network and application security
  • Architecture and authorization approaches (role-based access control, direct entitlements-based)
  • Strong understanding of security architecture best practices, standards and frameworks
  • Strong communication (written/verbal) and collaboration skills
  • Consulting, negotiation and relationship skills
  • Experience working in large, geographically dispersed IT organizations and a decentralized Security Model
31

Senior Cybersecurity Architect Resume Examples & Samples

  • Creating assessment reports providing analysis of vulnerabilities and providing remediation and mitigation recommendations to the software coding team
  • Responsible for designing and developing new systems, applications and solutions and system integration for enterprise wide cyber systems and networks
  • Ensures system security needs established and maintained for system design and analysis, test and evaluation, system vulnerability, incident response, security risk assessment, certification and accreditation and other Cybersecurity related issues
  • Integrates new architectural features into existing infrastructures
  • Provides architectural analysis of Cybersecurity features and relates existing system to future needs and Cybersecurity trends
  • Recommends solutions to complex technical problems and resolves integration and testing issues
  • Participates in planning, development and proactive implementation of Cybersecurity solutions based on emerging threats
  • Typically requires a bachelor's or master's degree in computer science, information technology or related field and nine or more years of progressive experience in Cybersecurity with a bachelor's or seven or more years with a master's
  • Required to stay abreast of emerging and evolving DoD IA requirements
  • Adept with NIST SP 800 series Risk Management Framework and CNSSI 1253 Security Categorization processes
  • Must have experience with DoD 8570 IAM/IAT Level III, IA Workforce Improvement Program compliant
  • Experience with the creation and submission of Authority to Operate (ATO) packages is required
  • Must be a hands on technical experience with computer networks, platform vulnerabilities, platform hardening
  • Familiarity with Lifecycle Cycle Management Center Cybersecurity procurement language is desired
  • Experience triaging and tracking change management of Cybersecurity related engineering issues is desired
  • Ability to obtain and Maintain a DoD Security Clearance is required
32

Cybersecurity Architect Resume Examples & Samples

  • 10 years of experience in information assurance support roles, including risk management, network security auditing, and network configuration compliance
  • 5+ years of experience in a Certification and Accreditation (C&A) role in a DoD environment
  • 4 years of experience with the detailed design, installation, and configuration of IT systems and networks in accordance with DoD Cybersecurity policies and STIGs, including the configuration and use of security products
  • 4 years of experience with performing IT application, system, and network project reviews and providing technical and policy DoD Cybersecurity guidance
  • 2+ years of experience with performing a C&A role in a DoD environment using the Risk Management Framework (RMF)
  • Experience with system engineering, network level devices, firewalls, proxies, and virtualized technologies preferred
  • Experience with securing network virtualization technologies used to consolidate network control functions from hardware devices a virtualized control node or console
  • Experience with multi-tenant network architectures
  • Experience with a variety of network routing and switching equipment devices from multiple vendors
  • Experience with C&A processes in DoD environments, including using the Risk Management Framework (RMF) to complete the C&A tasks required to achieve ATO for complex systems or networks
  • Ability to develop risk assessments, analyze, and evaluate complete networks using a variety of security tools
  • Ability to analyze Layer-2 and Layer-3 networks, firewalls, proxies, ports and protocols, etc. for security configuration compliance
  • DoDD 8570 IAT III Certification, including CISSP, CISA, CASP, GCIH, or GCED
33

Cybersecurity Architect Resume Examples & Samples

  • Driving the development and the ongoing improvement of GGP’s enterprise-wide cyber security architecture program in alignment with GGP’s policies while ensuring compliance with relevant regulations and frameworks
  • Participating as a key contributor in the development of Information Security Strategy and 3-Year Roadmap for all Security Technology domains
  • Organizing, performing, and interpreting the results of penetration tests to ensure newly implemented systems are secure prior to be launch
  • Performing architecture reviews for new IT initiatives and providing periodic reviews of existing systems to ensure alignment with security best practices and policy
  • Providing input on the strategic direction of the Security Architecture team
  • Serving as the security representative for the Architecture Review Board and Change Approval Board
  • Serving as a key IT and cyber team influencer and collaborator by building improved security practices across business IT programs, infrastructure and application delivery teams
  • Leading information security projects throughout the entire project lifecycle
  • Functioning as an escalation point and providing side by side coaching for less experienced Analysts and Engineers