Information Security Architect Resume Samples

4.9 (112 votes) for Information Security Architect Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security architect job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MS
M Stroman
Marianne
Stroman
418 Bergstrom Street
New York
NY
+1 (555) 574 5462
418 Bergstrom Street
New York
NY
Phone
p +1 (555) 574 5462
Experience Experience
Chicago, IL
Information Security Architect
Chicago, IL
O'Conner Inc
Chicago, IL
Information Security Architect
  • Tool Management - Manage/Operate the existing tools like CA Control Minder (CA PIM)/CA Access Control, etc. in order to manage the security policy
  • Provides security-centric subject matter expertise in operating systems, databases, network devices and application development platforms
  • Provide security architect solutions, assist in risk mitigation, and fulfill security governance and best practices within the environment
  • On request from Client, assist in the development of the client IT & Security Strategy and its associated IT & Security Initiatives, Principles and Guidelines
  • Manage security audits performed by third parties
  • Work with development and operations team to implement security strategies
  • Provide business guidance to management and internal partners
Dallas, TX
Enterprise Information Security Architect
Dallas, TX
Grady-Gusikowski
Dallas, TX
Enterprise Information Security Architect
  • Background in securing ‘big data’ services, and/or architecting separation controls in ‘cloud’ systems
  • Develops and maintain the organization's enterprise architecture; alignment of IT security strategy, incorporating NEXCOM's business goals
  • Develops the information security strategy and approach for initiatives including but not limited to PKI, Single-Signon, Two factor Authentication etc,
  • Design, review, and approve information security architecture, including but not limited to
  • Develop the methodology for integrating strong security governance procedures with an eCommerce Agile Project Management delivery methodology
  • Conducts advanced technical research, including market research of solutions based on vendor supplied documents
  • Documents system security design features and provide input to implementation plans and standard operating procedures
present
Phoenix, AZ
Senior Information Security Architect
Phoenix, AZ
Williamson Group
present
Phoenix, AZ
Senior Information Security Architect
present
  • Working knowledge of Nmap, Nessus, Kali Linux, Wireshark, Metasploit Framework, and other security-related tools
  • Manage implementation strategy for various IDS/IPS components as relates to network perimeter controls
  • Responsible for architecting and managing implementation of all matters relating to security of McGraw Hill Education's networks globally
  • Strong knowledge of technology and security topics including network and application security, infrastructure hardening, security baselines, web server, and database security
  • Participate in ongoing IT Security measurements and reporting for senior management review
  • Verifies security systems by developing and implementing test scripts
  • Assist in coordinating contingency plan tests on a regular basis
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Southern California
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong computer skills in order to operate effectively with company systems and programs; working knowledge of applicable computer applications used at ABC
  • Strong ability to think and communicate at the conceptual, logical through to the detailed levels
  • You have strong technical knowledge of enterprise application architecture
  • Possessing a good understanding of risk management, security architecture, common design flaws/weaknesses, and vulnerability analysis
  • Team-oriented player, self-directed, confident, personable, professional
  • Demonstrate strong organizational and attention to detail skills
  • Broad Information Security knowledge with Subject Matter Expertise in one or more of the following areas with strong understanding of
  • Strong knowledge of the application of ITIL principles for Service Management (ITIL Certification a plus)
  • Proficient use of common tools like Visio, SharePoint and knowledge of TOGAF or SABSA supporting tools
  • High level of personal integrity, as well as the ability to professionally handle confidential matters, and show an appropriate level of judgment
Create a Resume in Minutes

15 Information Security Architect resume templates

1

Information Security Architect Resume Examples & Samples

  • Research and Assessment
  • Communication and Reporting
  • Consulting and Advisory: Work closely with portfolio personnel, stakeholders, and senior management to identify Information Security trends, solutions and design options
  • Understand business and Information Security strategies as they relate to the portfolio
  • Provide Information security solution and design advice and counsel to portfolio personnel, project teams, and the Business ensuring proper balance of business needs, risk and cost
  • Lead security architecture for the portfolio as required
  • Provide portfolio personnel guidance in understanding new information security trends, solutions and design
  • Create or provide input into enterprise security design patterns, creating artifacts, blueprints and document the Architecture Designs
  • Be an advocate for information security solutions and architecture
  • Work as Information Security subject matter expert for information security solutions and architecture
  • Research and Assessment: Research current information security solutions and design relevant to the portfolio and future trend. This includes assessing pros and cons of each solution and design
  • Understand current architecture and technology used in business solutions provided by technology partners for the portfolio (application, data, processing infrastructure and network infrastructure) and future trend. This includes understanding the risk from information security issues related to the architecture and design
  • Research and assess options that best resolves the information security issues
  • Socialize research and assessment results with technology partners and business to get buy-in. If required involve appropriate level of management in this effort
  • Communication and Reporting: Periodically present to management on various information security trends, solutions and design options that were presented to technology and business partners and level of acceptance achieved
  • Communicate with Information Security Officers (ISO) on accepted information security solutions and design for the portfolio
  • Present new information security trends, solutions and design options to technology and business partners
  • Local Organization Managers and staff
  • IS and IT Risk Corporate Support Areas
  • Other ISO’s
  • Supplier Relationship Owners/Procedures,
  • 7-10 years experience Designing Information Security Solutions from both Data/Application and Infrastructure standpoint
  • 3-5 years experience in an Architect capacity
  • Experience conducting TRA, Controls assessment, Security Audit
  • In depth knowledge of security architecture and design principles
  • Demonstrated experience creating blueprints and Architecture artifacts
  • Working knowledge of the technical areas supported e.g. applications, data warehouses, mainframes, networks, RDBMS, Servers, etc
  • Working knowledge of Banking or Financial Information Security aspects
  • Working knowledge of Banking Policies, Standards, and operating procedures relating to information security risk
  • Information Security certification e.g. CISSP, CISSLP, GIAC etc.,
  • Consulting
  • Research
  • Advanced analytic skills
  • Strong relationship management skills
  • Negotiation/mediation
2

Information Security Architect Resume Examples & Samples

  • Minimum of 6 years of successful progressive experience in security, IT architecture or engineering
  • Experience in planning, organizing, and developing IT security system technologies
  • Extensive knowledge of planning and implementing information security systems addressing endpoint protection, data loss prevention, intrusion protection, governance risk and compliance, security information and event management, web security, network security, application security and data security
  • Experience with systems design and development from business requirements analysis through to day-to-day management
  • Knowledge of standards-based architectures, with an understanding of how to get there, including security/compliance monitoring and enforceability
  • General understanding of networking and telecommunications
  • Proficiency with Word, Excel, PowerPoint, Microsoft Project, and Visio
  • Available to work some weekend and evening assignments, as well as availability during off-hours for participation in scheduled and unscheduled activities
  • GIAC Security Leadership, CyberSecurity Forensics Analyst, ISSAP-CISSP preferred
  • Experience with supporting an enterprise with multiple data centers, locations, divisions, and subsidiaries with total number of users over 2K people, preferred
3

Information Security Architect Resume Examples & Samples

  • 5+ years of experience with Progressive Information Security
  • Bachelor's Degree in Computer Science or a related technical field
  • CISSP, GSEC, or other security certifications
  • Strong understanding of networking, firewall implementation, and IDS/IPS tuning
  • Understanding of project management methodologies
  • Knowledge of DLP tools
  • Strong understanding of MS AD, systems and endpoint security controls
  • Exposure to application and infrastructure vulnerability assessment tools
  • Ability to perform risk assessments on proposed technical solutions, identify risks and propose solutions to mitigate risk
  • Understanding of application security and secure development processes
4

Principal Information Security Architect Resume Examples & Samples

  • Provide tier-3 Security Operations and Risk Management support
  • Windows and Unix security vulnerability assessments and penetration testing
  • Participation in multiple facets of the Security Awareness program
  • Malicious software de-obfuscation, reverse engineering and analysis
  • Vulnerability, application and penetration testing
  • Participate in projects, planning, controlling, executing and closing assigned projects to produce required deliverables
  • Maintain the Information and Content Security Lab
  • Provide technical mentoring and training for Information and Content Security Staff
5

Information Security Architect Resume Examples & Samples

  • Creating and Refining Security Standards
  • Creates, updates security standards in accordance with industry best practices
  • Helps oversee the socialization of these standards to information technology and business teams
  • Oversees the enforcement of standards on information assets within the company
  • Risk and Vulnerability Management
  • Understands the application of risk methodologies to implement security controls
  • Hands on management of vulnerability scanning methodologies using commercial and open source tools
  • Oversees the remediation of vulnerabilities
  • Architectural Design and Implementation
  • Architects and designs complex implementations of security technologies
  • Manages market surveys of technologies
  • Oversees proof of concept studies of selected security technologies
  • Works with information technologies and other third parties to architect and design the implementations
  • Oversees the implementation of large scale enterprise wide security projects
  • Minimum 10 years related experience in Information Technology and Information Security
  • Expert knowledge of networking, system administration and security standards
  • Advanced level experience architecting and designing TCP/IP networks
  • Experience in Cisco technologies including ASA firewalls, F5 Load balancers, IDS/IPS systems, UNIX, AIX, Linux system administration, encryption technologies, Digital Certificates, SSL, VPN technologies, DNS and web security architecture
6

Information Security Architect Resume Examples & Samples

  • Provides technical security architecture or advanced security engineering services at a system or enterprise level
  • Minimum 8 years of experience in networking technologies with emphasis on Cisco firewalls and routers, IDS/IPS systems and load balancers etc
  • Must have the ability to oversee large complex implementation projects across multiple business units
  • Excellent documentation and verbal communication skills required
  • Must possess ability to handle multiple project assignments and provide security consulting services to Sabre technology and business units
  • Documentation: Enters, transcribes, records, stores or maintains information in written or electronic form
  • IT Security Awareness: Knowledge of security awareness programs to establish and communicate security requirements, responsibilities and policies to employees
7

Senior Information Security Architect Resume Examples & Samples

  • Perform security architecture reviews to support overall organization's security posture
  • Develop and maintain threat models working with business units, software and network architects, and technical subject matter specialists. Monitor internal and external threats and provide mitigation strategies for the enterprise
  • Translate business and technical requirements into extensible, scalable, and maintainable security solutions to include translating the IT-risk requirements and constraints of the business into technical control requirements and specifications
  • Develop and manage Log management SEIM solutions. Work with various technology groups and outsourced service providers to assure security events are analyzed and incidents detected
  • Manage implementation strategy for various IDS/IPS components as relates to network perimeter controls
  • Participate in ongoing IT Security measurements and reporting for senior management review
  • Maintain current and best-practice technical knowledge to support rapidly changing technology
  • Manage implementation of strategy to assure adequate protection of McGraw Hill Education's Global Data Network perimeter and internal segmentation networks
  • Assist in the management and enforcement of IT Security Policies
  • Manage various outsource providers operation of firewalls. Assure that McGraw Hill Education's policies are complied with and contract SLAs are met
  • Responsible for architecting and managing implementation of all matters relating to security of McGraw Hill Education's networks globally
  • Managed process for network penetration testing by internal and 3rd party resources as a means to validate the integrity of network controls
  • Comprehensive knowledge of network security and protocols (TCP/IP VOIP/ IPSEC/ VPN) with demonstrated ability to operate key network security tools
  • In-depth knowledge of firewalls, (host based, network and web application firewalls), IDS and IPS systems for policy enforcement and management
  • A detail understanding of cryptography, mobile security, cloud security and PKI infrastructure
  • In-depth knowledge of log management / SEIM applications.Understanding of security assessment methodologies and technical knowledge of tools for assessment of security risks
  • In-depth knowledge of security standards and techniques for network and applications
  • Basic understanding of OWASP principles and practices
  • 5 to 10 years of network experience, with at least 5 recent years of network security specific experience
  • Bachelor’s Degree or equivalent experience in Computer Science, Information Security, or Information Technology/Security
  • The candidate for this position must have a strong information security background: preferred CISSP, CISM, GIAC GSEC, CompTIA Security+ or Cisco security certifications (CCNP, CCIE)
  • High standards, solid analytical skills, and strong attention to detail
8

Information Security Architect Resume Examples & Samples

  • 5-10 Years of Information Security expertise in the following domains – Credential Management, Device Management including provisioning and hardening, Policy Management, DLP, Denial of Service prevention, Two-Factor, and Intrusion Detection
  • Strong analytical skills to define risk, identify potential threats and develop action/mitigation plan
  • Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences
  • Certified Information Systems Security Professional. (CISSP)
  • Master's Degree in Information Systems Management, Information Security or equivalent
9

Principal Information Security Architect Resume Examples & Samples

  • Provides security-centric subject matter expertise in operating systems, databases, network devices and application development platforms
  • Remains current in leading security technologies and methodologies
  • Possess exceptional communication and interpersonal skills and is customer service oriented
  • Mentors developing team members and assists them in deepening their skills or understanding of relevant issues and data protection options
  • Experience with Qualys, Cisco ASA, F5 load balancers, Sourcefire IDS/IPS, McAfee IDS/IPS, McAfee Proxy filters, Radware DDoS, Prolexic DDoS and other related technologies strongly preferred
  • Global Regulations: Complies with unique privacy and security regulations of applicable countries; communicates these regulations to others
  • IT Security Architecture: Defines security requirements and deliverables; ensures procedures for ongoing support and continuous availability of security services
  • IT Security Policies & Procedures: Documents standards and controls, creates policies, translates into requirements for delivery, collaborates to implement, audits to ensure proper deployment internally and with outsourced/external vendors
10

Senior Information Security Architect Resume Examples & Samples

  • Advises & leads business and technical partners in creating and maintaining the enterprise's security architecture design, including infrastructure and application security standards
  • Stays abreast of relevant security activities, security related technology implementations, best practices and related controls for use in the enterprise
  • Knowledge of Enterprise Architecture (EA) modeling
  • Ability to work with little guidance
  • Knowledge of enterprise architecture
11

Information Security Architect Resume Examples & Samples

  • Six or more years in information security architecture and assessment
  • Ten or more years in combined information technology / information security experience
  • Must have a strong background in working within a dynamic and large business environment, conducting security assessments and designing security controls
  • Must be effective in establishing and managing constructive relationships with the business and IT professionals
  • Requires ability to communicate with technical teams and executives in both verbal and written form
  • A high degree of self-motivation and ability to manage numerous initiatives in parallel is essential
  • Deep technical expertise in security architecture design and/or security assessment
  • Knowledge leadership in the information security discipline as demonstrated through published articles, research, or conference speaking engagements
  • Bachelor’s in technical field such as computer science or information technology
  • Information Security experience in the financial services industry is a plus
12

Information Security Architect Resume Examples & Samples

  • Works with NBCUniversal broadcast IT and with other security and risk functions to identify security requirements, using methods that may include vendor review, application protocol evaluation and technical vulnerability assessments
  • Assists in the coordination and completion of information security operations documentation
  • Reports to NBCUniversal’s Chief Information Security Architect concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance
  • Understands broadcast industry security updates, technologies, and best practices to improve broadcast security posture
  • Collaborates on critical broadcast IT projects to identify and document best practices with broadcast and vendor applications and hardware to design secure architectures for their deployment
  • Works across NBCUniversal’s broadcast technology organizations and members of the information security team to identify, select and implement technical controls to secure the broadcast environment and improve their ability to deliver a world class product
  • Supports service-level agreements (SLAs) to ensure that security controls are managed and maintained
  • Documents normal and exception-based processing of security configurations as they relate to the broadcast environment
  • Reviews security configuration and installation of security devices such as firewalls, routers, IDS,etc
  • Works with the vulnerability management team to maintain regular reviews of the security posture of the security configuration and the broadcast applications
13

Information Security Architect Resume Examples & Samples

  • Acting as the Information Security Architecture subject matter expert
  • The capture of the existing security technology landscape and defining the ‘to be’ security technology roadmap in collaboration of the Information Security Leader
  • Being a key input into the technology aspect of the security strategy
  • Providing high level costings for security involvement within project delivery
  • Provide input into technology security standards
  • Be a one of the main champions and provide thought leadership for excellent Information Security across Australia and New Zealand
  • Take direction from the Information Security Leader on focus areas, priorities, new areas…etc
  • Deliver services within the current security budget
  • Consult with the ANZ architects and designers during projects to ensure the solution design provides the necessary levels of security
  • Be responsible for ensuring the technology controls within a project are sufficient, comply with the Information Security policy and principles, and are in line with the strategic Architectural direction
  • Champion good Information Security practice within project delivery
  • Document where necessary the security architecture and design within projects
  • Excellent communication skills at all levels of staff, from technical resources through to senior leadership
  • Strong ability to think and communicate at the conceptual, logical through to the detailed levels
  • Presentation facilitation
  • Knowledge management Attributes/Behaviours
  • Self-motivated and directed
  • Strong strategic and conceptual thinker
  • Exceptional problem solver
  • Great communication
  • The ability to be a thought leader and influence people
14

PKI Information Security Architect Resume Examples & Samples

  • Technical program oversight specific to the relevant Information Security domain
  • Identification of concepts and architectural areas of need specific to the relevant Information Security domain
  • Development of technical security strategies
  • Development of technical security architectures
  • Development of technical security standards
  • Individuals in this role must be well versed and educated in common Information Security practices and the CISSP domains, as well as possess general Information Technology experience. They must be able to leverage these experiences and education to identify opportunities for improvement in the firm’s present information security architecture focusing on PKI and multi-factor authentication solutions as well as furnish thought leadership around enacting the necessary improvements and addressing gaps
  • Further, individuals must be able to meld key tenets of information security, through policy and best practices, to the IT strategies to develop technical security strategies that properly align. It is anticipated that Security Architects will work through their leadership to gain an understanding and perspective on emerging IT strategy as part of these efforts
  • 8+ years of practical experience in the field of IT is required and 5+ years Information Security experience (inclusive of the IT experience)
15

Senior Principal Information Security Architect Resume Examples & Samples

  • Recognized as an effective collaborator internally and externally (with 3rd party resources or vendors)
  • Must have experience in designing, implementing and managing complex networks for large enterprises
  • Must have a thorough understanding of security requirements and best practices around network design and implementation
  • Security Integration: Knowledge of security methods for various systems components, including databases, webs, networks and applications
16

Information Security Architect Resume Examples & Samples

  • Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices designed to meet network segmentation goals in a global enterprise environment
  • Plans and designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards
  • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation
  • Upgrades security systems and processes, driving proactive ongoing risk mitigation; identifying security gaps; and evaluating and implementing enhancements
  • Play an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned. Complete remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed. ·
  • Establish collaborative working relationships with the businesses, functions and regions to ensure that IT solutions align with security architecture and business strategy
  • Enhances security team accomplishments and competence by planning delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members
  • Bachelor's Degree in Information Security, Computer Science, Computer Information Systems, Management Information Systems, Business, or equivalent IT experience
  • Minimum of 10-15 years of experience in IT infrastructure roles
  • Minimum of 3-5 years of hands-on information security experience
  • Advanced technical skills and hands on experience in information security as it relates to server security, client security, network communications, and data storage
  • Practical experience with database security, content filtering, vulnerability scanning, and anti-malware
  • Strong network security knowledge to include Remote access - VPN, Firewalls, DMZ architecture, network monitoring, intrusion detection, web server security, and wireless security
  • Advanced knowledge of the TCP/IP protocol suite, DHCP, DNS, LAN/WAN, and Operating System concepts
  • Advanced knowledge of the OSI model and security that is associated with each layer
  • Advanced knowledge of wide area network security as it pertains to networking protocols and connectivity to/from outside resources (switches, routers, firewalls, VPNs, encryption, and authentication methods)
  • Ability to process large amounts of data and think critically
  • Process focused individual with ability to understand complex global systems and interdependencies
  • Writing is clear, precise and well organized, using appropriate terminology and tone; proficient in analyzing and preparing written assessments and recommendations for remediation or improvement
  • Strong project management discipline, research skills and multi-tasking abilities; prioritizes work activities, sets goals and develops realistic action plans
  • Identifies and resolves problems in a timely manner, anticipating barriers to execution; gathers and analyzes information, considers alternate solutions and achieves results despite resource constraints
  • Communicates effectively in both private and public forums, articulating thoughts and ideas in a fluent and organized manner
  • Relates well to people, is approachable and builds effective relationships using diplomacy and tact; ability to engage and leverage externally contracted staff and advisory personnel
  • Proficient in core software applications (Word, Excel, PowerPoint)
  • Prior experience in a global organization preferred
  • Ability to effectively self-manage
17

Information Security Architect Resume Examples & Samples

  • Technical expertise in security control design and engineering including technologies such as firewalls, web proxies, user directories, networking, operating systems, middleware, endpoint security, VPNs
  • Proficiency with Windows and UNIX operating systems
  • Competency with scripting and/or programming (shell, ruby, python, perl, java, c, etc.)
  • Proficient with SQL and data analysis
  • A bachelor’s degree in a technical field such as computer science or information technology
18

Lead Information Security Architect Resume Examples & Samples

  • Responsible for architectural elements associated with creating Information Security strategic plans, to include understanding and leveraging technology across the enterprise to reduce technological capability duplication and increase Fifth Third’s efficiency and ability to monitor and control Information Security functions
  • Must work across organizational boundaries to ensure Fifth Third’s various technology groups are synchronized, while reducing duplication of effort and increasing
  • Acts as an internal consultant, advocate, and change agent. Viewed as an Information Security expert and critical technical resource across technical areas and business segments
  • Represents Information Security at enterprise review meetings (ITAC, NPI Reviews, Production Readiness, etc.)
  • Plays a key role as the information security architect for projects and initiatives. Responsible for detailed security architecture, vulnerability assessment, and design for highly complex projects
  • Collaborates with the Business Controls organization and Information Security leadership to define Information Security strategic goals and roadmaps
  • Ensures that new projects, products, enhancements or initiatives align with the Information Security strategic goals
  • Establishes cross-organization relationships to ensure security architecture decisions are aligned with organizational goals and that security risk and concerns are appropriately articulated to leadership
  • Maintains and demonstrates an expert understanding of enterprise systems, policies, standards, regulatory requirements and business drivers, while ensuring compliance is met
  • Bachelor’s degree in related discipline with 7 or more years of experience
  • Interdisciplinary experience in the following areas: Security Architecture & Design, Identity & Access Management, Network Security, Application Security & Secure Coding, Security Governance & Risk Management, Cryptographic Mechanisms, Policy & Standard development
  • Hands-on Penetration Testing experience and ability to understand and communicate security flaws and vulnerabilities. Can develop attack simulations and work with technology and risk partners to bring a real-world understanding of risk. Familiarity with commercial and open source tools
  • Knowledge of secure coding standards and static and dynamic application testing
  • Ability to manage multiple, diverse tasks simultaneously and effectively prioritize work
  • Excellent communications skills and the ability to build effective relationships with business leaders and stakeholders (technical and non-technical)
  • Strong collaboration, communication, problem solving, conceptual and analytical skills
  • Able to work at high level of autonomy in a dynamic environment
19

Information Security Architect Resume Examples & Samples

  • Works closely with enterprise architects, software developers, enterprise systems, networking, PMO, and other functional areas and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Serves as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Contributes to the alignment of security governance with enterprise architecture governance and project and portfolio management
  • Ensures compliance to standards, policies, and procedures; conducts incident response analyses; develops and conducts training programs
  • Researches and designs new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors
  • Evaluates and develops secure solutions, based on approved security architectures. Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks
  • 5-7 years of combined IT and security work experience, with a broad exposure to infrastructure/network and multi-platform environments
  • Advanced knowledge of security issues, techniques and implications across all existing computer platforms
  • Knowledge of a security-specific architecture methodology (for example, SABSA, ISO 27000)
  • Proven ability in security process and organizational design
  • EXPERIENCE:5-7 years of combined IT and security work experience, with a broad exposure to infrastructure/network and multi-platform environments
  • CERTIFICATIONS:Professional security management certification, such as a Certified Information Systems Security Professional (CISSP) or other similar credentials, is desired
  • EDUCATION: A bachelor's or master's degree in computer science, information systems or other related field; or equivalent work experience
20

Information Security Architect Resume Examples & Samples

  • Leads business and technical partners with expert knowledge of relevant security system technologies
  • Elicits and translates business requirements to systems specifications for securing complex business systems; ensures security specifications align with business requirements
  • Prepares and analyzes detailed systems specifications for complex security systems that fit with the Bank's system architecture standards
  • Collaborates with business functional groups in analyzing and evaluating business requirements; develops and manages the security aspects of the logical and functional design
  • Reviews departmental and bank processes or procedures related to supported security controls and/or systems and proposes relevant changes/updates
  • Bachelor’s Degree required
  • Required license(s) or certification(s) ISSP – Certified Information Systems Security Professional OR GIAC – Global Information Assurance Certification preferred
  • Minimum of ten years of security experience (experience in and understanding of all security domains); minimum of 12+ years of IT experience (server/desktop hardware & software, networking, storage, disaster recovery, backup/restore, etc
  • Previous project management experience highly desirable
  • Experience in a regulated industry highly desirable; financial services preferred
  • Imperva Secure Sphere Database Activity Monitoring background
  • Priviledged access management experience
  • Knowledge of VMware NSX network virtualization platform
21

Director, Information Security Architect Resume Examples & Samples

  • 5+ years working directly on detailed security architecture and engineering assignments
  • 10+ years working experience across IT and Information Security
  • Broad, deep, and current technical acumen subject matter expertise across all domains of security
  • Especially strong competence in network security, wireless security, database security, web and mobile application security, data protection, encryption, authentication, identity & access management, and the internet of things
  • BS or MS in Computer Science, Computer Engineering, Electrical Engineering, or related field
  • Effective communicator spoken, written, and visual media. Can readily distill and convey important technical concepts to less- (or non-) technical stakeholders
  • Previous knowledge of XFINITY Home and/or Comcast IT environments
  • Previous work on security systems or other hybrid physical / cyber security environments
22

Enterprise Information Security Architect Resume Examples & Samples

  • Responsible for the design, development, implementation, and/or integration of a DoD IA (Information Assurance) architecture, system, or system component for use within the NEXCOM enterprise
  • Advises NEXCOM on the specific data technologies that support or enhance the organization for the long-term strategic responsibilities of NEXCOM IT systems
  • Designs, develops, reviews and implements system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation
  • Designs, develops, reviews and implements security designs for new or existing technology system(s). Ensure that the design of hardware, operating systems, and software applications adequately address IA security requirements for the computing environment
  • Provides system related input on IA security requirements to be included in statements of work and other appropriate procurement documents
  • Ensures security deficiencies identified during security/certification testing have been mitigated, corrected, or a risk acceptance has been obtained by the appropriate authorized representative
  • Ensures that the implementation of security designs properly mitigate identified threats
  • Develops and maintain the organization's enterprise architecture; alignment of IT security strategy, incorporating NEXCOM's business goals
  • Ensures compliance of artifacts to NEXCOM enterprise Information Assurance and BC/DR standards
  • Familiar with regulatory requirements such as DIACAP, PCI, PII, SOX
  • Participates in enterprise strategy development, including environmental analysis, opportunity identification, value cases and business innovation portfolio development regarding all areas of IT security and BC/DR functions
  • Documents system security design features and provide input to implementation plans and standard operating procedures
  • Conducts advanced technical research, including market research of solutions based on vendor supplied documents
  • Based on current and future business requirements, define configurations necessary for a disaster recovery site
  • Installs, configure, and maintain Governance Risk and Compliance toolset
  • Plans for future growth and resource needs by consulting with system administrators and other computing technical professionals, recommending and providing security principle guidance and direction
  • Investigates and understands the IT threat potentials and provide insight on specific IA threat concerns to NEX components, and recommends mitigation or prevention best practices
  • Ensures/implements the rigorous application of Information Security/Information Assurance policies, principles, and practices in the delivery of Systems, Applications and/or Services (Hardware & Software)
23

Information Security Architect for Ericsson Mobile Financial Services UAE Resume Examples & Samples

  • You work very closely with the security teams in Ericsson Mobile Financial Services and the customer delivery organization execute projects to increase compliance, improve security, simplify and reduce cost
  • At least 5 years experience with working as a solution architect
  • Proven ability with taking risk based security decisions, and weighing the interest of multiple stakeholder and risk profiles against each other
  • Experience with information security in mobile financial services and/or financial services is preferred
  • Self going
  • Proven ability to multitask and handle multiple complex tasks simultaneously under time pressure; ability to prioritize
  • Excellent communication skills, easy to talk to, outgoing
  • Sensitive to political aspects of vendor-customer relationships
  • Ability to achieve short term results while aiming for long term goals
  • You understand the compliance is not necessarily the same as security and know how to reason, argument and deliver secure and user friendly solutions which also are compliant
  • Excellent skills in interacting with staff at all levels in a professional way
24

Information Security Architect for Ericsson Mobile Financial Services Resume Examples & Samples

  • Your primary responsibility is to ensure the information security of our Wallet Platform deliveries towards our customers within Ericsson MS (Managed Services), ADM (Application Development Management), CS (Customer Support) and CSI (Consulting and Solution Integration) and compliance against contractual obligations
  • Your secondary responsibility is to act as a coach to all staff involved and manage the security relationship with the customer and third parties
  • Your other responsibilities include ensuring adherence to security SLAs and mandatory compliance levels against customer and Ericsson security policies, security standards and benchmarks such as PCI DSS, ISO27001, ISO22301, Center for Internet Security benchmarks, OWASP, etc. You also ensure compliance obligations against regulation on financial services, information security, data protection and related areas are met
  • At least 5 years experience as an information security architect, information security consultant or in an information security line function
  • Multiple certifications and related work experience is preferred
  • Experience with implementing and auditing security certifications such as PCI DSS, ISO27001 and ISO22301 is preferred
  • Proven ability to take in a large volume of information, such as polices, and determine their impact in a particular situation, e.g. whether a change request is compliant
  • Proven consultancy skills
  • Understand that compliance is not necessarily the same as security and know how to reason, argument and deliver secure and user friendly solutions which also are compliant
25

Principal Information Security Architect Resume Examples & Samples

  • Codes highly complex programs; derives logical processes on technical platforms to support business processes and initiatives. Designs user system interfaces and business application prototypes to meet business needs
  • Engages in performance/integration testing, business and technical analysis, and data modeling; builds high complexity screens, windows and reports to meet company technology needs
  • Serves as a technical expert for clients to eliminate gaps and inconsistencies in the initial and new information system architectures to ensure that solution meets client needs and to develop relationships with clients
  • Establishes the principles, directions and standards related to the information system framework at the program/project level to meet business needs
  • Defines the specific components of the information system solution and the resulting relationships to ensure alignment with the overall system
  • Ensures that information solutions are flexible to support incremental development, ongoing maintenance and future enhancements of the system
  • Oversees and facilitates cross-functional teams working in parallel to meet architecture needs; provides guidance and oversight in developing internal information solution architecture
  • Researches technological advancements to ensure that information systems are continuously improved and aligned with industry and company standards; designs and provides updates to standards to enhance company solutions
  • Identifies business requirements; ensures delivered information solutions meet performance engineering expectations
  • Facilitates reduced risks to the client by ensuring adherence to information solution architectural requirements that meet client price, scope and time constraints; serves as a technical expert for clients to eliminate gaps and inconsistencies in the initial and new information system architectures
  • Bachelor's degree in computer science, engineering, information systems or related field preferred
  • Nine or more years of information systems technology experience
  • Experience working with appropriate programming languages, operating systems, hardware and software
  • Experience working with the technology industry
  • Experience working with the interface of information technology with functional groups within an organization
  • Good interpersonal and presentation skills
  • Good leadership and organizational skills
  • Ability to set technical direction for a project or application
26

Information Security Architect Resume Examples & Samples

  • Work with development and operations teams on tactical security solutions as needed
  • Manage security audits performed by third parties
  • Perform risk analysis for potential security issues
  • Track security findings and progress of fixes
  • At least 3 years experience in security auditing
  • At least 2 years experience in developing web application code
  • At least 2 years experience in in the financial services industry
27

Senior Principal Information Security Architect Resume Examples & Samples

  • Be SME for all security related processes and technologies
  • Minimum 10 years of experience in networking technologies with emphasis on Cisco firewalls and routers, IDS/IPS systems and load balancers etc
  • Experience with vulnerability management tools, firewalls, load balancers, IDS/IPS
  • Problem solver: You will be able to self-identify frameworks and approaches to achieve your objectives and drive those forward independently
28

Information Security Architect Resume Examples & Samples

  • Minimum of 10 years of general IT or networking experience
  • Minimum of 5 years of Information Security experience as a primary role
  • Bachelor's degree in information systems, computer science or equivalent work experience
  • Ability to work with only minimal supervision
  • Excellent technical knowledge of mainstream operating systems [for example, Microsoft Windows, Macintosh, Linux] and a wide range of security technologies, such as network security appliances, secure file transfer protocols, anti-malware solutions, and desktop security tools
  • Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans
  • Knowledge of network infrastructure, including routers, switches, firewalls, storage, content and media management systems, broadcast media, and the associated network protocols and concepts
29

Principal Information Security Architect Resume Examples & Samples

  • Provide cutting edge, creative direction for next generation of company-wide security architecture, addressing technologies and processes associated with network infrastructure and business information systems
  • Lead implementation of large-scale security projects
  • Provide security expertise and direction on projects related to security architecture and design, implementation, maintenance, governance, and risk management
  • Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
  • Knowledge and understanding across a wide breadth of technology domains, with the ability to quickly assimilate the inter-relationships various disciplines
  • Demonstrated expertise in enterprise security architecture, including: securing service oriented architecture (SOA); network security; application security; Internet and Intranets; network infrastructure and web services
  • Hands-on experience with a diverse range of security technologies that include: multivendor stateful, non-stateful and application firewalls, HIDS, IDS/IPS, wireless, SSL and IPSEC VPN’s, SSO, multifactor authentication, database technologies, encryption technologies, endpoint and cloud security
  • Strong analytical skills with the ability to parse requirements and relate them to security controls
  • Excellent written and verbal communication skills and able to work with minimal supervision
  • Undergraduate degree in Computer Science, Engineering or related field. Graduate degree, preferred
30

Information Security Architect Resume Examples & Samples

  • 8+ years of hands on technical experience in an IT Security discipline
  • 4 years of hands on firewall design and implementation experience
  • Expert-level knowledge of security principles and technologies
  • Experience evaluating, designing, reviewing, and implementing security solutions
  • Fluent in risk identification, categorization, communication and mitigation
  • Skilled in threat modeling and familiar with using frameworks to guide decision making based on risk tolerance and business objectives
  • Extensive knowledge with relevant experience in at least five of the following: Third party connectivity architecture and design, DMZ / network segmentation design best practices, Intrusion Detection/Prevention System tuning, Security hardening techniques, F5 load balancing / application firewall design, Antivirus / Endpoint protection design, Vulnerability scanning lifecycle management, Penetration testing / remediation, Proxy architecture / design, Privileged access management, Network Access Control (NAC) architecture / design, Broad knowledge of diagramming tools and monitoring tools
  • Experience with Cisco ASA/PIX series devices
  • Bachelor's Degree in Computer Science, Computer Engineering, EE or comparable discipline
31

Information Security Architect Resume Examples & Samples

  • Influence the overall information security strategy for new and existing technology solutions across the Deloitte US firm, while considering potential risks in the organization’s current technology architecture and deployments
  • Support implementation of the strategic and technical architecture direction of the US CISO organization across the Deloitte US firm
  • Collaborate with management, security teams and other stakeholders of the FSSs and Enabling Areas to determine information security needs and requirements for all systems and associated infrastructure
  • Responsible to oversee and drive the design and implementation of security architecture controls in support of business IT projects and applications
  • Responsible for maintaining and updating information security technology architecture roadmaps through industry research and continued learning
  • Review the organization’s information security architecture and platforms to identify integration issues and opportunities to enhance information security practices
  • Partner with and provide security architecture expertise to the all business and technology areas
  • Monitor and provide input at key checkpoints throughout program or project lifecycles
  • Assess applications, application architectures and the associated data flow for risks to sensitive data, systems, or infrastructure
  • Industry certification required (e.g., CISA, CISSP, etc.)
  • Minimum 10+ years of enterprise information security architecture and information security system design
  • Advanced knowledge of information security technologies, such as identity and access management, encryption, and multi-factor authentication, among others
  • Technical proficiency in areas of information technology, including operating systems (e.g., Android, iOS, Linux, Windows, MVS, VMWare), cloud computing, servers, networks, desktops and mobile devices
32

Information Security Architect Resume Examples & Samples

  • Requirements Gathering: The employee will work with other SPE employees to define clear requirements for engineering and architecture work, either generating them or assisting in their generation
  • Solutions Engineering: The employee will work with other SPE employees to develop reasonable and innovative solutions to problems presented by both businesses and threats
  • Documentation: The employee will be responsible for formal documentation and schematic work which represents the company’s information security architecture
  • 8 - 10 years Information Security experience preferred
  • Technical skills: In-depth/hands-on familiarity with UNIX/Linux and Windows operating systems administration as well as network infrastructure, security tools and IP-based network protocols
  • Excellent verbal, written and presentation communication skills
  • Experience working for a high profile public enterprise in a security context
  • Experience presenting highly technical concepts to a business-focused audience
  • Broad knowledge of computer security issues, requirements and trends, and a strong understanding of information security and data privacy laws / accepted industry practices
  • Demonstrate strong organizational and attention to detail skills
33

Information Security Architect Resume Examples & Samples

  • Ph.D. or Master’s degree in computer science, statistics, physics, computational mathematics, machine learning, operations research, or a related quantitative discipline
  • 7-10+ years of progressive experience with logical and physical data modeling
  • Hands on experience with Oracle, SQL Server, VSAM, IMS, DB2 and Teradata
  • Experience with robust, operationally sound production environments
  • Experience with large/very large databases; large scale development, Internet development, and large integration projects
  • Knowledge of software project lifecycle and software engineering
  • Understanding of distributed environments (e.g., Unix, NT, Data, Application and Web servers)
  • Experience with wide variety of data platforms including No SQL, Triplestore / RDF and Hadoop solutions
  • An in-depth understanding of algorithms, data structures, machine learning, numerical methods, probability theory, information retrieval based approaches, techniques, and methods
  • Background in mining large sets of data and the ability to interpret and clearly visualize data
  • Familiarity with harvesting data from different endpoints, databases, APIs and other sources of information
  • Active professional security certifications (e.g., CISSP or other similar industry qualification)
34

Information Security Architect Resume Examples & Samples

  • Provide security architecture expertise in support of application and system development, infrastructure, and enterprise technology projects to ensure the security of the Company's assets
  • Assess project requirements related to application, network and infrastructure security, including assessment against First Republic security policy and standards
  • Identify and document architectural and other security risks associated with the solution architecture, and mitigating controls where necessary
  • Develop, implement and continue to mature the security architecture policies, standards, practices and guidelines
  • Mentor junior Information Security staff ensuring a collaborative and healthy learning environment
  • Ideally, at least 10 years combined hands-on experience with information systems security, design, development, implementation and support
  • BS in Computer Science or equivalent experience preferred
  • Information Security and/or technical certifications strongly preferred
  • Thorough knowledge and understanding of software technologies, as well as the methods used in performing risk analysis
  • Experience with common operating systems and server platforms (e.g. Windows, Linux, UNIX)
  • Knowledge of Networking, Virtualization, Storage and Cloud Technologies including but not limited to secure implementation of: local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), wireless networks (Wi-Fi), switches, routers, firewalls, wireless access points and related security and network devices; Hypervisors, VMs and VDIs; Storage Area Networks (SAN), Network Attached Storage (NAS), CIFS, SMB and relevant security and replication technologies
  • Excellent understanding of cloud security and experience with design and/or implementation of applications in the cloud; Understanding of cloud deployment models: Private Cloud, Public Cloud, Hybrid Cloud; Cloud service models: Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS); implementation of relevant controls to ensure Confidentiality, Integrity and Availability of Bank data
  • Extensive knowledge of technical security controls and technologies (e.g. IDS, IPS, traditional, NextGen and Web Application Firewalls; Data Loss Prevention; Antivirus, Anti-malware and Zero Day technologies; Security Information and Event Management (SIEM); Access and Identify Management and Privileged User Management; Public Key Infrastructure and Certificate management)
  • Ability to obtain a working knowledge of all areas of the organization and the ability to develop a clear understanding of the Bank’s key functional processes and critical customer services
  • Exceptional interpersonal (‘people’) skills to interface with managers and staff at all levels within the organization
  • Ability to meet deliverables on time and on budget
  • Familiarity with office productivity tools, databases, project management and risk management tools
  • Ability to design, resource, conduct, status, and complete projects independently, with minimal supervision
  • Technical expertise – the ability to understand and communicate the technical aspects of computer security
  • Communication skills – the ability to verbally communicate technology-related issues and security-related issues to every level of the organization (end-users, IT staff, managers, vendors, contractors, etc.). Written communication skills are also important for writing security-related policies, standards and awareness documents
  • Mediation skills – the ability to bring people with competing objectives together and reach appropriate compromises toward final solutions. Equally important is the ability to take a stand when needed, even when it’s unpopular
  • Management or business skills – the ability to manage teams, manage multiple projects or problems, convey ideas and effectively bring security solutions to individual lines of business
  • Ability to work with diverse groups (in and outside the organization) and communicate security issues
  • Provides extraordinary service
35

Information Security Architect, VP Resume Examples & Samples

  • Leading UNIX security initiatives and projects, including evaluation of security tools, reporting of project and issue status
  • Serves as a team lead of the UNIX security team
  • Role supports security controls and enforcement of security strategies in accordance with established policies, standards, guidelines and procedures
  • Develops/defines the security standards for new/existing security controls
  • Working collaboratively with other EIS stakeholders such as the Windows, Active Directory, malware security teams
  • This job will also have the ability to cross train with the teams listed
  • Working collaboratively as part of a team to design, implement, and enhance security controls for UNIX systems
  • Creation and maintenance of event log correlation use cases to identify potential security violations and anomalous behavior
  • Performing complex analysis and technical tasks involving event detection and rapid response across various environments of the enterprise
  • Analysis of syslog event logs across the environment to identify anomalous behavior and patterns
  • Overseeing monitoring systems and programs used to detect and report security violations
  • Participating in forensic projects as required, including collection, preservation of electronic evidence
  • Identifying weaknesses and discrepancies in security programs and development of mitigating controls
  • Scripting to automate incident response and investigation processes
  • Documenting process workflows and SOPs for the Security Operations Center (SOC)
  • Contributing to the teams continuous improvement efforts
  • Information security, IT risk management, IT audit
  • Experience with scripting such as PowerShell & bash
  • Demonstrates the ability to convey technical findings in simple language
  • Proactive mindset and actions
  • Aptitude to lead complex efforts with minimal supervision
  • Bachelor's degree in Computer Science, Technology, or relevant work experience
  • Understanding of commonly used protocols and services is required (e.g. SSL, TCP/UDP, WWW, FTP/SFTP, NTP, Telnet, NFS, SSH, LDAP, etc.)
  • Experience working from top 10 banking
  • Working knowledge of Windows operation systems
  • File Integrity Monitoring, Advanced Detection Technologies, Malware
  • Experience with SOX 404, PCI, GLBA
  • Experience working in a SOC, network operations center (NOC) or computer security incident response center
  • CISSP, CISM, CISA, CEH, GREM, PMP, Six Sigma Belts
36

Information Security Architect Resume Examples & Samples

  • Analyzing and developing policies and solutions to support Secure Sockets Layer (SSL) Certificates on an enterprise scale
  • Analyzing and developing policies and solutions to support Email Security on an enterprise scale
  • Leading enterprise scale projects from design through completion
  • Managing resources through day to day support as well as project efforts
  • Identify control deficiencies by analyzing and identifying underlying root causes
  • Research and prototype emerging technologies and techniques
  • The capability to program or script in one or more languages of the following languages (Python, Java, or Visual Basic)
  • Understanding of conceptual processes and system characteristics in the security space
37

Information Security Architect Resume Examples & Samples

  • Provide day-to-day collaboration, guidance, and mentoring to Information Security associates
  • Provide principal design and technical oversight and expertise for all aspects of the Scottrade Information Security environments, including business continuity and disaster recovery. Set direction for the current and future Information Security Infrastructure systems in support of all business and IT sponsored projects
  • Provide 24x7 support of the Information Security environments, including on call support
  • Evaluate and recommend products and technologies. Maintain the product service catalogue, lifecycle management, and related documentation
  • Work closely with business and IT associates, and outside vendors to effectively choose, plan, deploy, and maintain system changes
  • Establish and maintain Information Security architecture best practices, including procedures, guides, templates, and relevant documentation
  • Advanced knowledge of design and maintenance of a comprehensive large scale Information Security Systems Solutions and best practices to ensure a secure environment
  • Ability to interpret Industry best practices and regulatory requirements and apply them to the Scottrade environment
  • Expert level proficiency with enterprise class firewalls, load balancers, endpoint detection and response solutions, advanced persistent threat systems, privileged access management, two factor authentication, and identity and access management
  • Expert level proficiency with TCP/IP protocals
  • Intermediate level proficiency with Routers and Switches
  • Advanced understanding of end point security systems, server and desktop virtualization principles
  • Familiarity with ACI and or NSX
  • Advanced knowledge of LAN/WAN networking skills
  • Advanced security knowledge of Windows and Linux operating systems to include core applications such as Active Directory, IIS, Apache, and NFS
  • Familiarity with Enterprise class storage systems to include NAS,SAN, and CAS
  • Must possess strong interpersonal skills with the ability to easily and effectively interact and collaborate with highly technical, non-technical, support, and business staff at all levels
  • Must possess good leadership skills and be able to lead groups of diverse IT associates in both strategic and tactical initiatives
  • Ability to multitask in a fast paced support environment
  • Advanced level proficiency with Visio
  • Advanced level proficiency with Microsoft Word, Excel, PowerPoint and Outlook
  • Bachelor’s degree in related field, or equivalent combination of education and experience preferred
  • 7+ years as an Information Security Engineer required; 2 of those years at the Senior or Architect level
  • Experience in a DevOps environment preferred
38

Information Security Architect Resume Examples & Samples

  • Significant experience working in healthcare regulatory compliance, and security compliance program management with the proven ability of conducting investigations and providing leaders with recommendations, as typically acquired during 5 to 7 years in a similar position
  • Extensive experience utilizing security tools such as vulnerability scanners and log management tools
  • Previous experience in a healthcare information security role
  • Demonstrated professional ability to implement solutions and activities related to the development, implementation, and improvement of a information assurance program in support of the CISA efforts to maintain compliance with applicable federal and state laws and regulations and outlined company information security policies
  • Significant experience assuring that information assets are adequately protected using available solutions and information security best practices
  • Extensive experience developing systems, templates, tools, and processes to identify and monitor indicators to measure compliance with security requirements
  • Proven experience developing, implement, and maintain policies and procedures consistent with applicable federal and state information security laws
  • Extensive knowledge regarding compliance with security regulations, Office for Civil Rights, Federal Sentencing Guidelines, and healthcare laws and regulations
  • In-depth working knowledge of and experience implementing and operating an information security program based on HIPAA Security Regulations and other pertinent and applicable state and federal laws and regulations related to the protection of health information
  • Working knowledge of electronic systems and emerging technologies that impact information security
  • Working knowledge of management of an effective ethics and compliance program, including training, monitoring, conducting and documenting investigations, addressing violations, and monitoring corrective actions
  • Demonstrated ongoing competency in compliance and risk management
  • General knowledge of other disciplines outside own area of expertise, including business planning, clinical disciplines, human resources, finance, clinical and financial auditing, and information technology
  • Strong understanding of information technology approaches, applications, tools, methodologies, and technology platforms
  • Thorough knowledge of architecture and interrelationships (technical and functional)
  • In-depth knowledge of information security standards with an emphasis on National Institute of Standards and Technology (NIST) cyber security standards, guidance, and special publications, and their application in the technical operational environment
  • Extensive knowledge of applicable federal and state security laws and regulations, and a working knowledge of electronic systems and new technologies that may impact information security compliance
  • Demonstrated ability to function effectively in a dynamic and challenging environment and to affect change
  • Proven ability to analyze problems and issues and to understand the legal and operational impact of decisions from a variety of perspectives
  • Demonstrated ability to initiate, plan, execute, and control activities to meet requirements and timelines of system-wide initiatives or projects that are frequently driven by new or changing regulations
  • Excellent and dynamic verbal, written, and presentation skills, including the ability to translate complex legal and regulatory requirements and issues into terms readily understood by management, line, and clinical personnel
  • Demonstrated ability to organize, prioritize, plan, and work effectively with managers to achieve compliance with objectives
  • Demonstrated ability to maintain confidentiality and exercise good judgment as it relates to the handling of sensitive material
  • Advanced level of competency using Word processing, spreadsheet, presentation, and office communications applications, preferably the Microsoft Suite
  • Proven ability to translate and provide sound advice to senior management regarding the impact of emerging industry trends in compliance enforcement, legislation, and regulations on Sutter Health’s business strategies and it’s not-for-profit mission
  • Demonstrated ability to understand and lead by communicating vision, exhibiting decisiveness, sponsoring change, and supporting the larger organization’s success
  • Seasoned investigative skills, including the ability to skillfully obtain accurate, complete, and detailed information necessary to make accurate and well-founded determinations about compliance failure
  • Demonstrated ability to plan, organize, implement, and evaluate compliance and risk management programs in a healthcare setting
  • Conceptual, analytical, and problem-solving skills in a complex environment
  • Tact, diplomacy, and ability to work with individuals in all levels of the organization
  • Demonstrated ability to lead diverse ad-hoc teams and facilitate through conflict resolution to create
39

Senior Information Security Architect Resume Examples & Samples

  • Work closely with business and technology professionals to develop strategies and solutions that address information security risks, while supporting the attainment of business and compliance objectives
  • Lead the development and maintenance of an Enterprise Security Architecture that supports the existing technology and creates flexibility to move towards new technologies on premise and in the cloud
  • Develop the business, information and technical artifacts that constitute the enterprise information security architecture and solutions
  • Contribute to the alignment of security governance with EA governance, project and portfolio management (PPM)
  • Research, design and advocate new processes, technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors
  • Contribute to the development and maintenance of the information security strategy and program
  • Communicate security risks and solutions to business partners and IT staff
  • Work on multiple projects as subject matter expert in information security
  • Coach and mentor junior technical staff as required
  • You hold a bachelor's or master's degree in computer science, information systems, other related field or equivalent work experience
  • You have a relevant professional security management certification (CISSP, CISM, CISA, etc.)
  • You posess seven (7) to ten (10) years of combined experience in IT architecture, security, infrastructure, networks, solution and application development
  • You have in depth knowledge of security issues, techniques and implications on various technological platforms
  • You have knowledge and experience with enterprise and security architecture methodology (Zachman, TOGAF, Gartner, SABSA, etc.) is an asset
  • You have proven ability in security processes and their organizational design
  • You have a strong understanding of security, compliance and risk management frameworks (CoBIT, ISO-2700x, ISO-31000, PCI-DSS, etc.)
  • You have a strong conceptual thinking, communication (written and verbal), presentation and negotiation skills
  • You have a passion for developing results oriented and creative solutions and approaches to solve problems
  • You have the ability to work well under minimal supervision
  • You are team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including vendors, IT and business personnel
40

Information Security Architect, VP Resume Examples & Samples

  • Understand technical solutions to develop integrated solutions to resolve highly complex technical and business issues. Recognized expert internally and externally within a discipline(s) and often provides strategic direction, guidance and integration of products and services
  • May lead projects and provide guidance/training to more junior staff or may supervise a small staff
  • 40% Lead Development and Design Efforts across teams. Responsible for leading a team that evaluates business process and application software, which affect the integrity, functionality, and reliability of the bank's network and systems
  • The responsibilities extend to designing and leading pro-active reviews and self-assessments of the systems established. Assess effectiveness of designed controls
  • Integrate information and network security solutions
  • Provides technical expertise and support to business lines. Generally assigned the Project Manager of the most complex projects, including the development of detail project plans, preparing detailed task plans outlining all requirements to implementation
  • Works independently with minimal management guidance and support
  • 20% Lead responsibilities include training or mentoring staff to effectively apply information security theories and concepts to specific circumstances. Provides technical work direction to the staff who monitors, develops and maintains security policies and procedure
  • 20% Analyze trend /data for long range planning to management
  • 10% Provided input to the overall strategic direction to Management. Ensures any division wide strategy is implemented with assigned areas/systems
  • 5%. Responsible for responding to information security related problems. Assess issues / problems and take immediate corrective actions if appropriate
  • 5%Processing access requests, performing certifications, answering phones, supporting users
  • Required to have a minimum of 7 years experience in information security, 8 to 10 years experience in the other fields and/or be able to thoroughly demonstrate the skills necessary.)
  • Required to direct work experience in the areas of information security, IS auditing, data processing operations, systems development and/or computer programming
  • Detailed knowledge of several operating systems and corresponding security systems in use at the bank
  • Maintain certifications for security and information systems. The capability to program in two or more of the following languages (C, C++, Assembler, COBOL, DYL280)/ Outstanding oral and written communications skills
  • A demonstrated ability to manage complex projects in an effective manner. This includes the ability to prepare detailed task plans outlining all requirements to complete the given assignment
  • Knowledge of basic banking concepts and theories. A thorough knowledge of security software packages and operating systems in use at the bank, networking concepts, and information security principals
  • Able to create native productivity aids and command scripts. Have a thorough understanding of personal computers and software productivity packages like Microsoft Office, Access, Excel, and terminal emulation software
41

Information Security Architect IAM Resume Examples & Samples

  • Lead the design, deployment and operation of software and hardware devices related to Identity and Access Management including, but not limited to: RSA (Aveksa) Identity Management and Governance (IMG), IBM Tivoli Federated Identity Management (TFIM), Microsoft Active Directory Federated Services (ADFS), and single sign on (SSO) authentication and access, etc
  • Influence, consult with and build collaborative working relationships with senior business and IT leadership at the VP/Officer and C levels to help meet long term security objectives
  • Participate in the design review process and support the overall Security Architecture process
  • Influence and drive change to security architecture processes, strategies and standards, as needed in areas such as: information security, Data Loss Prevention, Intrusion Prevention, Threat and Vulnerability Management, and Identity and Access Management
  • Research, evaluate, recommend, plan implementation of, and test new or improved information security software or devices
  • Coordinate analysis of new or enhanced software application or tool implementations for impacts to existing security software and devices
  • Participate in and/or lead forensic investigations and eDiscovery of suspected information security issues or in compliance reviews as requested by auditors, HR, Ethics, or Legal
  • Utilize security expertise and knowledge of new and emerging cyber attacks threats to make recommendations to management regarding implementation of best practices and/or process improvements to proactively protect the company’s systems and networks
  • Bachelor’s degree and 7 years of broad based information security experience, with expertise in the following areas: security engineering, security operations/ administration, incident response, audit, controls and risk management
  • If no degree, 8 years of experience as stated above
  • Prior experience with architecture processes, strategies and standards is required
  • IT consulting and executive advisory experience with demonstrated skills in translating business requirements to technical solutions is necessary
  • Solid project management experience in a cross-functional environment is required
  • Exposure to multiple, diverse technical integrations, technologies and processing environments
  • Experience coordinating vendor solution delivery and partnering effectively with vendors to meet business needs
  • At least one security industry certification (i.e., CISSP, CISA, CISM, SANS)
42

Information Security Architect Resume Examples & Samples

  • Generally 2-5 years experience in information security, or 5-7 years experience in information technology or internal audit
  • Requires a Bachelor’s degree in computer science, management information systems, accounting, business or a related discipline
  • Understands systems and network concepts including: access, authorization, configuration, and design
  • Demonstrates understanding of information security concepts including: encryption, access controls, network security, security operations, security architect and design
  • Understands software application issues including: buffer overflows, injection attacks, and cross-site scripting
  • Experience designing and securing large-scale, multi-tier application and network deployments in collaboration with development, network and system engineering teams
  • Understanding of applicable regulatory requirements including PCI DSS, GLBA, and the FFIEC IT booklets
  • Experience working with various operating systems and hardening standards, especially Microsoft Windows/Active Directory/Group Policy, VMWare ESX/vSphere, and the associated CISecurity.org benchmarks; knowledge of Fiserv (ITI) systems a plus
  • Experience working with and securing Cisco routers, switches, and firewalls
  • Must possess at least one of the following certifications: CISSP, CISM, CIPP, CFE, or SANS GIAC
43

Information Security Architect Resume Examples & Samples

  • Establish and communicate corporate security policy, principles, procedures, and standards enhancing Perrigo’s capabilities to sustain IT confidentiality, integrity, and availability
  • Establish and communicate corporate security governance/assurance practices, implement an ongoing risk evaluation program as well as consistently lead the way in enhancing Perrigo’s capabilities to sustain IT integrity
  • Engage across IT and the business to ensure an understanding of the importance of information security to protect Perrigo’s data and technology assets
  • Partner with assurance/audit/compliance/privacy and legal teams
  • Stay abreast of and recommend new information security technology(ies) as well as risk management practices to facilitate business initiatives
  • Promote, initiate, and mature tactical initiatives that align with the Council on Cybersecurity’s Critical Security Controls
  • Experience with technical security teams supporting vulnerability, engineering, risk or threat management
  • Project Management experience; as a team member or technical project/program lead
  • Certification – the appropriate level of Professional status, which includes at least one, but preferably more: CISSP, CISA, CISM, CRISC, CCNP (R&S, Security and/or wifi), CCIE (R&S, Security and/or wifi), AWS Solutions Architect, VMWare certification (design or implementation), GLEG, GSEC, GCFW, GCIA, GCIH, GCWN, GCIM, G7799, GSNA, SNIA/SCSN-E, and/or MCSE-Security…
  • Strong work ethic, demonstrated self-starter, ability to work in a fast paced, team oriented environment, with excellent verbal and written and communication skills
  • 3-5 years of experience in IT technical roles, and 1-2 years progressively-responsible experience in IT security
  • Experience engaging in contracts with vendors, consultants and other third parties
  • Bachelor’s Degree in technology or business relevant field,
  • Security Operations Center experience
  • Government, Military, DoD or Private Sector Cyber Risk operational experience
44

Business Aligned Information Security Architect Resume Examples & Samples

  • Bachelors' Degree. Additional 2+ years of IT experience that includes Information Security, Delivering technology solutions, Risk Management, Database Architecture and/or Compliance may be considered in lieu of Bachelor's Degree
  • 5-7 years of experience delivering technology solutions in large-scale complex organizations
  • 1+ years of information technology systems design and planning experience; in systems, applications, or architecture
  • 2+ years of information security experience
  • Experience with a broad range of mobile and wed application design, development, and management principles, practices, and procedures
  • Experience influencing management on technical and business solutions
  • Knowledge and understanding of data protection technologies and practices
  • Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats
  • Knowledge and understanding of application or software security such as: dynamic application security testing, secure code review, and secure static code analysis
  • Knowledge and understanding of service-oriented architecture and associated security controls
  • Knowledge and understanding of enterprise authentication and authorization technologies such as LDAP, SAML, XACML, and reverse authenticating proxies
  • General understanding of diverse platforms and operating systems, including current and emerging technologies
  • Certified Information Systems Security Professional (CISSP)
  • 3+ years of experience in architecture, governance, risk management, PCI DSS control governance, application security, encryption, key management, and identity and access management
  • Experience architecting applications for financial services business
45

Information Security Architect for MTN Mobile Financial Services Resume Examples & Samples

  • At least 5 years experience as an information security architect, consultant or line function
  • Proven experience with security compliance
  • Experience with implementing security certifications such as PCI DSS and ISO27001 is preferred
  • Highly analytical and structured mindset
  • Fluent in spoken and written English
46

Information Security Architect Resume Examples & Samples

  • Analyze and design security solutions for applications and infrastructure, and provide expertise and consulting to clients
  • Identify and document information security risks and propose mitigating controls
  • Understand complex business IT needs, requirements, and projects scopes, with a focus on information security requirements
  • Collaborate with enterprise and regional architecture teams on architecture strategy, roadmaps, standards, and governance
  • Author project and support documentation and diagrams
  • Possesses 15+ years of progressive IT related working experience, which include
  • Worked on large scale cloud based services deployment (including SaaS, PaaS, IaaS) and understand security challenges involved in deploying Cloud Applications
  • Worked with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies
  • Exposed to new generation technologies: e.g. DevOps, Automation, Analytics: experience with deployment orchestration, automation, and security configuration management (Jenkins, Puppet, Chef, etc.)
  • Created and maintained security policies and procedures, managing the protection of information systems and assets
  • Performed threat modeling and design reviews assessing security implications and requirements introducing new technologies
  • Performed security design/architecture reviews, code reviews, and penetration tests of large applications, systems and/or networks
  • 8+ years Security Architecture experience in creating and managing enterprise security architectures and solutions
  • 3+ years of direct Cloud (AWS, Azure) deployment experience (not just conceptualization experience)
  • Experience of at least 3 public or private cloud implementations (Start-up, Financial or SaaS firm experience is preferred)
  • Required demonstrated knowledge of information technology security, trends, leading practices, regulatory and industry standard compliance issues (PCI, SOX, CSA, PCI, NIST, ISO, IEEE, TCG, etc…)
  • Experience with secure software development lifecycle, data protection, cryptography/key management, identity and access management (IAM), network security within cloud models such as IaaS, PaaS, SaaS
  • Have working knowledge of common and industry standard cloud-native/cloud-friendly authentication/authorization mechanisms (OAuth, OpenID, SAML etc.) and key management solutions (Safenet, Thales, etc…)
  • Strong interpersonal skills are essential
  • Experience working with agile delivery teams and environment would be an asset
  • Technical leadership experience is an asset
  • Strong influencing skill would be an asset
47

Information Security Architect Incident Response Resume Examples & Samples

  • Support and communicate a corporate security incident response plan and be available to lead a team through an incident. The first responder must be able to communicate effectively while under pressure and be able to direct a team to resolve the incident
  • Provide support/leadership in the Incident Response process
  • Communicate with other members of the security team to keep senior leadership apprised of the risks and threat landscape. Offer recommendations on the best course of action to stay in line with budgets and resources
  • Engage across IT and the business to ensure an understanding of the importance of information security to protect Perrigo's data and technology assets
  • Lead, investigate, document, and partner to resolve security issues through individual and team contributions
  • Serve as an expert technical resource
  • Promote, initiate, and mature technical initiatives that align with the Council on Cybersecurity's Critical Security Controls
  • Experience with technical security teams supporting vulnerability, engineering, risk or penetration testing
  • Certification - the appropriate level of Professional status, which includes at least one, but preferably more: CISSP, CISA, CISM, CRISC, CCNP (R&S, Security and/or wifi), CCIE (R&S, Security and/or wifi), AWS Solutions Architect, VMWare certification (design or implementation),GLEG, GSEC, GCFW, GCIA, GCIH, GCWIN, GCIM, G7799, GSNA, SNIA/SCSN-E, and/or MCSE-Security…
  • Strong work ethic, demonstrated self-starter, ability to work in a fast paced, team oriented environment, with excellent verbal, written, and communication skills
  • 5 to 7 years work experience in IT technical roles, and 2 to 3 years progressively-responsible experience in IT security
  • Bachelor's Degree in technology or business relevant field, Master's degree a plus
  • Experience in Pen testing or attack mitigation
  • Government, Military, DoD, or Private Sector Cyber Risk operational experience
48

Information Security Architect With Polygraph Resume Examples & Samples

  • Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture
  • Performs preliminary forensic evaluations of internal systems
  • Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation
  • 15-20 years of related experience in data security administration
  • Experience in Cyber Security; InfoSec; Security Engineering; Network Engineering with emphasis in cyber security issues and operations; computer incident response; systems architecture; data management; including malicious code detection; intrusion detection; and cyber security tool development and integration ? Review security plans and assist in developing security measures to safeguard information ? Provide guidance in the formulation of InfoSec policies ? Provide InfoSec guidance and direction at project inception and continuing through the lifecycle ? Assist in the evaluating and ensuring the compliance of IT systems; applications; and infrastructure; assessing vulnerabilities and providing appropriate security countermeasures ? Communicate security exposure; InfoSec incidents; or non-compliance situations ? Represent customer interests at technical exchange meetings within the customer group and across the organization ? Create artifacts and perform activities as necessary to implement customer and community security processes for product approval; system accreditation; procurement; or modification ? Leverage commercial products to support the security of the customer infrastructure; systems; and applications ? Review technical documentation to determine compliance within the community; customer; and security directives ? Conduct; participate; brief; and facilitate security information activities highlighting schedule; risk assessments; evaluations; and analysis ? Develop; document; and maintain security plans ? Create and document security requirements for systems and interfaces on numerous networks and platforms ? Analyze systems; including forensically; for malware; misuse and/or unauthorized activity; track; on a daily basis; intelligence (both open and classified sources) concerning malicious code threats ? Hands-on experience with network security applications; protocols and associated hardware ? Good interpersonal; organizational; writing; communications and briefing skills ? Experience with Nessus; App Detective; Web Inspect; and SuperScan ? Experience with Microsoft Office ? Experience with Information Assurance assessment tools ? Experience with Encryption technologies ? Experience with Identity and authentication technologies ? CISSP Certification
49

Information Security Architect Resume Examples & Samples

  • Typically has 5+ years information security experience
  • Must have 2+ years of direct experience security AWS environments (200+ EC2 instances) or equivalent
  • Must have experience with enterprise encryption and key management solutions and practices
  • Experience with ServiceNow Cloud Management and Orchestration is strongly valued but not required
  • Must possess strong verbal and written communication skills: ability to lead discussions with Information Security and other IT groups as well as to produce clear and concise documentation for technical and non-technical audiences. Must be able to lead executive and customer discussions around cloud security program and status
  • Must have hands on working knowledge of Linux and Windows administration including server hardening, and scripting and automation
50

Information Security Architect Resume Examples & Samples

  • Provides consulting services and security support to internal business and technical customers
  • Assists with the development of secure coding standards
  • Serves as a project process security shepherd
  • Supports safe and compliant deployments
  • Strong professional experience with at least one Static Application Security Testing (SAST) tool (e.g., HP Fortify SCA, Coverity, Veracode, FindBugs, other), its use, reports results interpretation, developer community support in remediating verified code-associated security vulnerabilities
  • Product configuration & tuning experience a plus
  • Professional experience as a software application developer in a leading development language (e.g., Java, .NET, C/C++), having performed web-based or mobile application development
  • Professional experience with software application security, and its associated standards and practices
  • Professional experience with securing mobile devices and applications (e.g., understanding attack vectors, system or code vulnerabilities)
  • Professional experience with popular operating systems such as Microsoft Windows and/or *nix
  • Professional experience with popular system databases such as Oracle, MS SQL Server, or MySQL
  • Professional experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering, and protecting organizational data
  • Professional experience with security policy, its interpretation, reference, and usage when delivering opinions, recommendations, and guidance
  • Possessing a good understanding of software design standards, principles, and practices
  • Possessing a general understanding of information security risk management (ISO\IEC 27001:2013, Octave-Allegro, ISO\IEC 31000, FAIR)
  • Possessing awareness and knowledge of PCI DSS 3.0, GLBA, SOX, COBIT, ISO\IEC 27001:2013, and/or NIST CSF standards
  • Possessing a Bachelor's degree in Computer Science, Engineering, Information Systems, Information Security, Mathematics, Physics, or a related discipline
  • Possessing a good understanding of risk management, security architecture, common design flaws/weaknesses, and vulnerability analysis
  • Payments industry, banking, or financial sector experience
  • Experience with software security testing tools (e.g., OWASP Zap)
  • Possessing security-centric certifications such as CSSLP, or CISSP, or other associated certifications
  • Possessing a Master's degree in Computer Science, Engineering, Information Systems, Information Security, Mathematics, or a related technical field
  • Strong planning, execution, interpersonal, organizational, and communications skills
  • Strong technical, logical, analytical, and problem-solving skills
  • Team-oriented player, self-directed, confident, personable, professional
51

Information Security Architect Resume Examples & Samples

  • Gaining a comprehensive understanding of the company’s technology and information systems and capabilities
  • Acting as the subject matter expert with regards to strengths and weaknesses of the systems and being able to recommend improvements to both software and hardware
  • 3 or more years of systems architecture experience
  • Familiarity with security industry standards (ISO 17799, ISO 27001/2, ISO 31000, NIST 800 series, etc.)
52

Information Security Architect Resume Examples & Samples

  • Developing and maintaining an overall information security architecture and roadmap for the company
  • Identifying tools and technologies to support this roadmap
  • Identification of information security risks and partnering around mitigating these risks will be a key part of this role, in support of projects and initiatives within Information Technology and in the business
  • Act as a technical advisor for issue resolution and business consultations
  • Will play a key role in practice wide initiatives for improving the confidentiality, integrity, and availability of the company’s infrastructure, applications, and data
  • Be responsible for all aspects of technology including the detailed-level architectural designing, construction, reconstruction of infrastructure, applications, and data
  • A strong risk management focus along with the ability to champion information security in support of the business will be key to success in this position
  • Overall Information Security Architecture and Roadmap: Work with infrastructure SME architects and engineers on overall information security roadmap and design
  • Business/Technology consulting: Be a leader across all teams within the business. Set directions that are for the betterment of the business and company and champion information security as a "Members First" strategy
  • Technical team and vendor management: Lead project team and manage projects to implement the information security roadmap
  • Expense, capital and operating: Be a leader with the infrastructure leadership team in annual operating and capital expense management
  • 7+ years of experience
  • 6-10 years of information security experience in a HIPAA regulated environment with a broad understanding of the threats and vulnerabilities unique to health care
  • Ability to provide architectural direction for multiple medium to large sized projects concurrently in various stages of their lifecycle or a large project full time
  • Able to play a leadership role in business development activities for large, complex opportunities as solution architect
  • Broad Information Security knowledge with Subject Matter Expertise in one or more of the following areas with strong understanding of
  • ID and Access Management
  • Data De-identification
  • Disaster Recovery Planning
  • Risk Management approach to information security
  • Knowledge of security tools and products
  • Strong knowledge of the application of ITIL principles for Service Management (ITIL Certification a plus)
  • Experience in troubleshooting and resolving complex technical issues (performance and security issues for example)
  • Information security certification a plus
53

Information Security Architect Resume Examples & Samples

  • Provide security design expertise to support systems engineers (i.e., OS, network, web server, application server, intrusion detection validation) and provides risk assessment and recommendations to management
  • Provide expertise in IT security systems including firewalls, intrusion detection/prevention systems, and security event consolidation/correlation & reporting systems, authentication systems and assesses system and network vulnerabilities and works with responsible groups to address them
  • Solve problems of diverse scope where analysis of data requires evaluation of identifiable factors
  • May be asked to coach, mentor, or train others and teach coursework as subject matter expert. Responsible for other duties as assigned
  • 3-6 years’ experience in information security, IT risk management, or IT audit
  • Bachelor’s degree in computer science, management information systems, or a related discipline
  • Capable with systems and network concepts including: access, authorization, configuration, and design
  • Expertise in information security concepts including: encryption, access controls, network security, security operations, security architect and design
  • Proficiency with software application issues including: buffer overflows, injection attacks, and cross-site scripting
  • Must possess at least one of the following certifications: CISSP, CISM, CRISC, AWS, CEH, ITIL, or SANS GIAC
54

Information Security Architect Resume Examples & Samples

  • Plan, analyze, and design global security systems including network monitoring, intrusion detection and prevention, identity management, access control, mobile device management, and data protection. Initiate upgrades to security systems as necessitated by technology availability and maturity, security gaps, emerging threats, business risk and needs, and cost effectiveness
  • Serve as a primary security contact for projects during the planning, analysis, and design phases of projects. Provide IT security technology and process guidance for enterprise architects and the business. Monitor ongoing projects to verify that security components are built and deployed as originally designed. Assist in reviewing compliance to Zurich’s reference security architecture and industry standards, internal policies, and procedures
  • Improve the security posture of business systems by planning and designing the delivery of security within the solutions. Evaluate security at all levels including network (firewalls, routers, etc.), server (mid-range, mainframe, virtual, appliance, etc.), OS (Windows, Linux, OSX, iOS, Android, etc.), application server (WebLogic, JBoss, WebSphere, etc.), application (Java, JSP, .NET, etc.), data store (Directory and database), authentication mechanisms, authorization procedures, auditing/logging, and user administration and access control. Consult on security considerations based on system delivery models including internally hosted, cloud hosted, cloud managed, mobile, etc
  • Research emerging threats, vulnerabilities, and security practices/standards to maintain professional relevance and assist during the response to security incidents affecting or potentially affecting the organization
  • Foresight to connect disparate pieces into cohesive but simple solutions
  • Execution – the ability to deliver, time and again
  • Has a bias for action using effective problem solving and decision making techniques
  • Risk assessment procedures, policy formation, role-based authorization methodologies, data security protection, authentication technologies and security attack pathologies
  • ISO 27001/27002, ITIL and NIST frameworks
  • Knowledge of best practices and methods of IT strategy, enterprise architecture and security architecture
  • Knowledge of software & web application security best practices
  • Knowledge of the latest security threats, techniques and exploits targeting vulnerabilities
  • Perimeter security controls – firewall, IDS/IPS, network access control and network segmentation
  • Router, switch and VLAN security; wireless security
  • Security concepts related to DNS, routing, authentication, VPN, proxy services and DDoS mitigation technologies
  • Network security architecture development and definition
  • Network or web penetration testing skills a plu
  • Written and oral English language proficiency
55

Information Security Architect Resume Examples & Samples

  • Works closely with IT applications architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all applications and database repositories to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Assists in developing the business, information and technical artifacts that constitute the enterprise information security architecture and solutions
  • Conduct risk assessments of new development efforts as well as externally purchased applications and web services
  • Serves as a security expert in application development efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Contributes to the alignment of security governance with IT architecture governance and project and portfolio management (PMO)
  • Researches, designs and advocates new technologies, methodologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors
  • Evaluates and advocates use of the approved SDLC processes to secure application solutions. Assists in analyzing business impact and exposure, based on emerging security threats, vulnerabilities and risks for application systems
  • Supports communication of application security risks and solutions to business partners and IT staff
  • This is an expert/technical role. It defines the information security application architecture and design for the enterprise
  • This person works on multiple projects as the subject matter expert
  • The role is involved in projects or issues of high complexity that require in-depth knowledge across multiple application platforms and business segments
56

Cts-information Security Architect Resume Examples & Samples

  • Provide technical and business guidance to management and internal partners
  • Monitor the security landscape, identifying security gaps, recommending mitigations, and evaluating mitigation effectiveness
  • Keep current with security threats and technologies
  • Maintain relationships with security vendors
  • Maintain currency with relevant statutory regulations
  • Determine security requirements by evaluating business strategies and requirements, researching information security standards, and applying applicable data protection regulations
  • Demonstrated ability to manage technical risks and drive future direction
  • Demonstrated ability to understand a complex, multi-platform cloud services environment and influence peer architects to improve its security, efficiency and scale over time
  • Bachelor's degree or equivalent industry work experience
  • 5+ years of experience as an IT Security Architect, Technology Consultant, System Engineer or similar role, compliance experience
  • Due to the client contract you will be assigned, this position requires you to be a U.S. citizen
  • Experience with data privacy/protection
  • CRM (Certified Risk Manager), PRM (Professional Risk Manager), ISO 27005 Risk Manager, CRMA (Certification in Risk Management Assurance), CERA (Chartered enterprise Risk Analyst), or other risk credentials a plus
  • Security+, SANS GIAC, CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) or CISMP (Certificate in Information Security Management Principles) a plus
57

Information Security Architect Resume Examples & Samples

  • Aid in the creation of a clear current and future state diagram development, as well as, in the resulting strategic roadmap
  • Work closely with enterprise architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with information security policies, industry regulations, and best practices
  • Research, design and advocate new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors
  • Contribute to the development and maintenance of the information security strategy in a cross-fertilizing manner (security strategy drives architecture, and architecture feeds back into security strategy)
  • Bachelor’s degree in Computer Science, Science, Engineering or related discipline required
  • 10+ years relevant information security experience, including 7 years in a significant security architecture role(s) with a broad exposure to infrastructure/network and multiplatform environments required
  • Professional security management certifications, such as a CGEIT, CISM, CISSP, or other similar credentials are preferred
  • Formal training in and usage of relevant enterprise architecture methodology (Zachman Framework, TOGAF, SABSA, etc.) required
  • Expert knowledge of security issues, techniques and implications across all existing computer platforms required
  • In-depth knowledge of multiple, highly complex technical areas and business segments required
  • Proficient use of common tools like Visio, SharePoint and knowledge of TOGAF or SABSA supporting tools
  • Experience coaching and mentoring of technical staff required
  • Strong conceptual thinking skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates
  • Team-oriented interpersonal skills, with the ability to interface effectively with a broad range of individuals and roles, including IT and vendors
  • Strong written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical audiences
  • Proven track record and experience in developing information security architectures and standards
  • Strong time management skills as well as strong organizational, problem-solving, and analytical skills required. Able to work in a very fast paced environment and remain positive
  • High level of personal integrity, as well as the ability to professionally handle confidential matters, and show an appropriate level of judgment
58

Information Security Architect Resume Examples & Samples

  • A minimum of 7 years’ experience in IT, and 3-5 years in design and Implementation of security practices and components
  • Solid understanding of end to end of IT processes including architecture, design, implementation and operations
  • Strong security, solution architecture and data expertise including web application security, web application firewalls, Intrusion detection systems, penetration testing, identity and access management, cloud architecture
  • Experience with application vulnerability assessments and driving remediation efforts
  • Experience defining and documenting application security requirements, creating approaches for their implementation in software applications and working with development teams to ensure their proper implementation and testing
  • Expert knowledge of cloud delivery models including continuous deployment methodology and delivery of web applications over cloud-based services
  • Security certifications (CISSP, AWS certified solution architect, vendor independent cloud related security certifications)
  • Be of mature disposition and personable, and able to work well in a global team environment spanning multiple continents / time zones
59

Information Security Architect Resume Examples & Samples

  • Designs more complex application security architecture. Coordinates technical design/review activities with various groups including application development, enterprise architecture, information security, systems, network, and database groups to develop secure frameworks and enterprise applications
  • Designs the enterprise security infrastructure and architectural topology including recommending hardware, operating system, software, and information security requirements to ensure the confidentiality, integrity, availability, and privacy of information systems. Ensure consistency and sufficient integration with existing infrastructure
  • Monitors, evaluates, and maintains systems and procedures to safeguard internal information systems and databases from unauthorized users
  • Researches, recommends and implements changes to procedures and systems to enhance security
  • Creates incident response plans, including coordination with appropriate departments, other business units, and appropriate authorities
  • Educates customers to increase awareness of information security policies and best practices
  • Collaborates with outside consultants/agencies as appropriate for independent security audits. Collaborates with business management to communicate security risk and countermeasures
  • May assist and/or provide limited direction to lower level technical personnel
  • Nine or more years of experience in information security
  • Good analytical and creative problem solving skills for design, creation and testing of new databases
  • Good skills in time, priority and task management
60

Information Security Architect Resume Examples & Samples

  • Design, deploy and manage suite of security tools and services, including, but not limited, to SIEM, IDS/IPS, DLP, AV, VA scanner, Penetration testing, APTs
  • Perform vulnerability scans and/or analyse results from vulnerable scans and assist with the remediation as necessary
  • Report to management concerns of residual risk, vulnerabilities and other security exposures, including misuse of information assets and non-compliance
  • Conduct security assessments and periodic security audits across Alere’s infrastructure
  • Ensure access to all information systems is controlled, both internally and externally, commensurate with the level of potential risk and recommend appropriate remediation
  • Participate in the security incident response efforts and other security investigation activities as assigned. Co-ordinate remediation with an appropriate sense of urgency and criticality
  • Define and implement appropriate security requirements for IT and business projects
  • Provide subject matter expert advice to IT staff in the detection and resolution of security risks
  • Coordinate multiple projects concurrently and influence the decision making process
  • Perform product evaluations, recommend and implement products/services for information security team
  • Work on diverse range of support issues requiring ability to independently identify, evaluate and resolve issues
  • Work proactively and uses own initiative to ensure business needs are met effectively
  • Ensure all solutions adhere to applicable change control requirements
  • Good time management skills, with proven ability to prioritise and organise a demanding workload, adapting to fit the changing needs of the business
  • Strong customer service orientation, able to understand and meet the needs of a diverse client base in a positive and professional manner
  • Proactive and self-motivated approach, able to work independently
  • Excellent interpersonal and communication skills (both written and verbal), able to relate with users, service providers, and management
  • Carries out duties in compliance with established business policies
  • Demonstrates commitment to the development, implementation and effectiveness of Alere Quality Management System per ISO, FDA, and other regulatory agencies
  • Responsible for exhibiting professional behaviour with both internal/external business associates that reflects positively on the company and is consistent with the company’s policies and practices
  • Understands and is aware of the quality consequences which may occur from the improper performance of their specific job. Has awareness of device defects that may occur in their area of responsibility, including product design, verification and validation, manufacturing and testing activities
61

Information Security Architect Resume Examples & Samples

  • Works closely with IT architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Works closely with IT and Business Architects to ensure policies, procedures and standards can be implemented effectively based on the technical solutions deployed at VF
  • Develops the process to create, review, approve and track information security policies, procedures, standards, exception processing to account for solutions that cannot align with policies and standards
  • Serves as a efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Develops the overall Information Security Awareness and Training strategy to ensure policies, procedures, standards, and information security threats are understood by the organization at large
  • Experience developing Information Security Policies, Procedures and standards and ensuring compliance across the enterprise
62

Senior Information Security Architect Resume Examples & Samples

  • Oracle Advanced Security
  • Oracle Platform Security Services
  • Oracle WebLogic Server
  • Oracle Identity and Access Management
  • Oracle Exadata and Exalogic
  • Oracle Virtual Machine
  • Oracle Enterprise Manager Cloud Control
  • Nimbula
  • Xsigo
63

Information Security Architect Resume Examples & Samples

  • Accountable for the creation of standards and patterns that capture security best practices of all JM technology
  • Assesses technology portfolio to ensure security while balancing complexity with efficiency
  • Provides coordination and advisement of activities associated with the implementation and management of information security managed systems and security controls
  • Advises and collaborates with leadership, architects, tech directors, PMO and business personnel providing best practices and identifies potential risks within technology solutions and processes
  • Provides advisement to ensure complete security testing and validation of technical designs
  • Provides direction and advisement for security event log collection, monitoring, intrusion detection and event response activities
  • Contributes and participates in the incident response program, maintenance of processes and documentation and is an active member of the incident response team
  • Initiates, facilitates, and promotes activities to create information security awareness throughout IT, including knowledge training sessions and lunch-and-learn activities
  • Participates in evaluations of IT compliance to information security standards, procedures and policies, and provides solutions for consistency of internal controls across IT
  • Assists in the creation and maintenance of the information systems disaster recovery and business continuity plans
  • Provides oversight and guidance to the monitoring activities associated with technology controls for various compliance areas including HIPAA, PII, PCI and GLB activities within the organization
  • Takes a lead role in the establishment of key metrics and recommends mechanisms to facilitate monthly information security reports and metrics
  • Is a leader in the Information Security team to ensure technical security knowledge and awareness of new and emerging threats and mitigation techniques are understood
  • Attends conferences and training as required to maintain excellence in the information security field
64

Information Security Architect Resume Examples & Samples

  • Engage in projects and mergers & acquisitions to assist with the development of conceptual and logical designs that ensure security architectural patterns are adhered to
  • Contribute to developing consistent security patterns and frameworks to evolve the company's information security architecture program
  • Ensure adoption of industry and enterprise best practices around information security, partnering with the Enterprise Architecture and Information Security and Technology Risk Management teams
  • Actively partner with stakeholders to understand business requirements and develop supporting security principles and objectives that will enable Cardinal Health initiatives
  • Proven industry experience within the overall IT Information Security field
  • Familiarity with information security standards and frameworks including ISO 27002, NIST, CoBIT, etc
  • Industry-specific certifications preferred, such as CISSP
  • Undergraduate degree in a technical field or commensurate experience
65

Information Security Architect Resume Examples & Samples

  • Defining security requirements by evaluating business strategies and requirements; researching information security standards
  • Ensuring that development is done in accordance with industry standards for secure development
  • Elements include Encryption, Access Control, Web Application Vulnerability Detection, OWASP top 10 and other common web application security parameters
  • Reviewing application architecture and design from an application security and information security perspective ensuring alignment with organization security standards and industry best practices
  • Providing input and recommendations to the development teams related to architecture, design, coding practices and SDLC elements that could potentially impact the application or solution from a security perspective
  • Facilitating Periodic static code analysis utilizing existing standard service offering
  • Facilitating dynamic and/or manual security testing utilizing existing standard service offering
  • Providing technical expertise on secure software development and support of all associated activities, processes, and tools for protecting technology-based information
  • Providing consulting services and security support to internal business and technical customers
  • Reviewing, developing, testing, and implementing security plans, products, and control techniques
  • Reviewing circumstances surrounding security gaps in and designs corrective actions
  • Evangelizing security policies and standards where/when needed
  • Maintaining awareness of security and technology trends and shares that knowledge with others
  • Assisting with the development of secure coding standards
  • Serving as the lead security liaison on assigned projects
  • Weekly Status Reporting - for Work in Process and Planned and issues
  • Documenting processes, procedures, assessment outputs, working papers documentation to support existing SDLC and governance requirements
  • Serves as a subject matter expert (SME) for performing vendor risk assessments to improve overall vendor risk program
  • Represents security and IT risks among other company risk departments and committees
  • Evaluates the effectiveness of awareness and training programs and makes recommendations for improvement
  • Mentors less-experienced team members
  • Experience with evaluating and implementing security controls as related to Cloud based services including SaaS, PassS, IasS
  • Strong computer skills in order to operate effectively with company systems and programs; working knowledge of applicable computer applications used at ABC
  • Working knowledge of network solutions and systems
  • Ability to communicate effectively both orally and in writing
  • Strong consultative skills; ability to interface effectively with technical and non-technical leaders
  • Preferred Certification in one or more Information Security relevant areas such as Audit (CISA), Security Management (CISM), Security Professional (CISSP) and business experience in a matrix Organization required
  • Security Certification(s) preferred (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM)
66

Lead Information Security Architect Resume Examples & Samples

  • Lead the planning and definition of security architecture, roadmap, components, policies and standards for all applicable solutions and technologies within the network security as primary domain of responsibility
  • Establish and create security models and baseline, review and approve initial configuration and major changes of assigned security solutions within covered security domains
  • Ensure that all implemented security solutions and security architectures integrate with group enterprise security architecture
  • Evaluate and assess existing or emerging security technologies, vendor products and service portfolio
  • 8+ years of progressive experience in the information security industry as architect, engineer or consultant
  • 5+ years of experience in design and implementation of network security systems and network segmentation
  • Information security industry recognized certifications from relevant certification bodies
  • Thorough understanding of security principles, practices and standards and how they translate into real world technical solutions
67

Principal Information Security Architect Resume Examples & Samples

  • Responsible for enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls
  • Participates in security governance processes
  • Participates in Information Security efforts across all business areas and client groups
  • Participates in the evaluation, selection and implementation of technology solutions including providing detailed analysis of pros and cons and build vs buy options
  • Participates on project teams contributing input with regard to security standards and the impact to technology
  • May participate in investigation and report contribution of security threats and incidents
  • May assist in conducting post-event reviews of security incidents
  • Continually works to enhance breadth and depth of knowledge and experience. Benchmarks technology strategies and architectures. Monitors and anticipates trends and investigates organizational objectives and needs. Provides guidance on security solutions and prepares benchmarking reports and presentations
  • Special projects as requested
68

Information Security Architect Resume Examples & Samples

  • Interfaces between security policymakers and Information Technology Services teams
  • Assists with the design and deployment of business and technology solutions throughout the business
  • Determines security requirements for the enterprise (including new and existing deployments)
  • Creates and maintains security policy as required
  • Performs risk assessments of new hardware and software deployments
  • Evaluates changes to major infrastructure, identifies issues and provides remediation plans as required
  • Works with outside vendors to evaluate and recommended technologies
  • Develops and maintains security processes
  • Evaluates security posture of projects throughout the enterprise from conception to deployment
  • Assists in conducting information security assessments and risk analysis of computing environment and in managing remediation efforts with Information Technology organization when vulnerabilities are identified
  • Performs and maintains compliance efforts with various laws and industry regulations including Payment Card Industry Data Security Standards (PCI-DSS), Sarbanes-Oxley (SOX) and HIPAA and Big Lots Information Security Policies
  • Reviews application design and develops and recommends remediation plans as required
  • Bachelor’s Degree in in computer science or related field or equivalent experience required
  • Minimum of six years of experience in an Information Technology field with at least three years in an information security function required. Experience in a retail company preferred
  • Experience writing security policies required
  • System design and architecture experience required
  • Systems administration and/or network/data communications experience required
  • Experience conducting security assessments and knowledge of Windows and Linux operating systems required
  • Experience with software development or background with writing automated scripts preferred
  • Knowledge of core internet and network protocols preferred (e.g., TCP/IP, DNS, SMTP, HTTP etc.)
  • Demonstrated strong interpersonal skills with the ability to develop alliances with key stakeholders preferred
69

Lead Information Security Architect Resume Examples & Samples

  • Scope areas for work
  • Security Architecture. Research, collaborate on, and design security architecture solutions for 3M
  • Serve as lead internal information security consultant for major corporate initiatives, and other prioritized 3M special projects
  • Serve as security consulting resource to 3M IT (Infrastructure Center of Excellence/Application Center of Excellence/SAP ERP/IoT, etc.) and business units
  • Track, and participate for 3M, in industry and emerging technologies research for areas relevant to information security. Examples include: information security for cloud computing trends, vendor customer advisory meetings, and for emerging 3M business areas (e.g. cloud computing, mobile, and IoT services)
  • Represent 3M information security on 3M cross-functional technical teams, periodically organize/host information security Special Interest Groups (recent examples: IDM, mobile/API security, etc.), and be a mentor resource for other 3Mers
  • Ensure that 3M’s layered security architecture approach effectively defends against current and evolving threats for functional (i.e. application requirements) and non-functional (i.e. supporting infrastructure) attack scenarios
  • Be able to specify/design security technologies, and processes, at all layers of the OSI stack, from: network security (and protocols), supporting middleware layers, application authorizations, endpoint controls, and the relevant security event logs for each
  • Demonstrate knowledge of, design solutions for, and consult about most of the following
  • Network security technologies, including NGFW, VPNs, SSL/TLS tooling, IDS/IPS, WAF, NAC
  • Encryption types, algorithms, and related technologies (key management, digital signature, S/MIME, PKI)
  • API security for SOAP-based and RESTful APIs, use of Gateways/Proxies for solution design, and options for protecting messages via encryption, authentication, signatures, and authorization attributes
  • Cloud security models for IaaS/PaaS/SaaS, including approaches to secure a modern DevOps/DevSecOps models
  • Knowledge, requirement gathering, and use of Security as a Service cloud models, examples: CASBs, IDaaS, tokenization, malware information feeds, and GRC services
  • ICS (industrial control system) security needs and considerations
  • Identity Management middleware technologies supporting runtime security: LDAP, WAM, AD, proxies, federation types (STS), COPS policy model
  • Identity Management technologies supporting pre-runtime services: Workflow, GRC, (de)provisioning, connector types, and integration patterns (tightly coupled, loosely couple, etc.)
  • AAA (Authentication/Authorization/Audit) protocols/token types commonplace in modern enterprise and cloud environments: Kerberos, LDAP, SAML, OAuth, OpenIDconnect, SCIM, XACML, JWT
  • Strong authentication options, including: OTP-MFA, biometrics, FIDO, U2F
  • Authorization approaches using RBAC and ABAC
  • Mobile security trends and technologies (MDM, MAM)
  • IoT security techniques
  • SIEM, logging, and UBA technologies
  • Endpoint security controls, and their use cases (e.g. AV, DLP, encryption)
  • Privileged Access Management solutions
  • Advanced malware detection/prevention technologies and mitigation
  • CnC, Botnets, DDoS, and mitigation technique
  • Forensics techniques and chain-of-custody preservation
  • Security controls frameworks experience with ISO, NIST, CSA, etc
  • Industry and government security and privacy requirements: PCI, HITRUST, HIPAA, US Export, EU GDPR, SOX, CJIS
  • Protect the corporation across all applications in 3M’s service portfolio: SAP ERP, legacy apps, 3M service businesses, 3m.com, R&D portfolio, employee services
  • Facilitate security technologies alignment between the information security team, and other technical 3M groups: R&D, other corporate labs and stake-holders
  • Participate in development of legacy portfolio management, transition, and harvest plans
  • Participate as a member of the Information Security, Risk and Compliance Team Leadership team
  • Minimum of ten (10) years of IT professional experience
  • Minimum of seven (7) years of information security experience
  • Security-related certification: CISSP, GSEC, CISM, or similar
  • Advanced degree in EE, CS, IS
  • Proven ability to drive growth and operational excellence through IT capabilities
  • Strong leadership and communication skills necessary to engage with stake-holders, governance, and cross functional teams
  • Good communication and documentation skills
70

Information Security Architect Resume Examples & Samples

  • You have strong technical knowledge of enterprise application architecture
  • Your comprehensive security background covers encryption technologies, network architectures, communications security, authentication methodologies, etc
  • You have a solid working knowledge of information security standards and guidelines
  • You’re experienced with security certifications and audits (ISO 27001, ISO 27018,SOC-1, SOC-2 etc.)
  • You have strong communications skills, both written and oral
  • You are organized, responsive, and a highly thorough problem solver
71

Information Security Architect Resume Examples & Samples

  • Integrity and confidence
  • A strong passion for everything security and customer service
  • A technical and analytical mind
  • Ability to consistently categorize, measure, and prioritize security risks, express them in the language of the business unit to make them easily digestible by system owners, and assist in their mitigation
  • Experience leading security assessments of large, enterprise-wide, globally-distributed systems
  • Experience managing long-term, triple-constrained projects with teams that span the organization
  • Experience applying CIS, SOC2, PCI, and other control frameworks to identify security gaps and prioritize their remediation
  • Strong writing, presentation, and verbal communication skills
  • Experience creating security assessment tools, producing reports on organizational security posture, and developing company risk governance frameworks
  • 7+ years of information security experience
  • 3+ years of directly building and managing information security architecture and risk governance
72

Chief Information Security Architect Resume Examples & Samples

  • Establishing and implementing security-related policies
  • Overseeing regulatory compliance
  • Ensuring data privacy
  • Managing the company's Computer Security Incident Response Team
  • Supervising identity and access management
  • Conducting electronic discovery and digital forensic investigations
  • Working with other high-level executives to establish disaster recovery (DR) and business continuity plans
  • Partner with athenaU to create internal training
  • Collaborate with the Product, Infrastructure and Platform architects to develop detailed technical requirements that these cross-functional teams can follow to ensure athena’s systems and software applications appropriately protect data
  • Provide a security centric governance function for all R&D teams
  • Broker relationships with infrastructure, R&D, marketing and compliance to run projects such as ethical hacking
  • Understand technology and systems infrastructure, including, but not limited to databases, identity and access management, network security, and encryption
  • Lead innovative approaches to encryption and security in big data and the cloud as well as mainstream enterprise technologies
  • Mature and deliver an overall Security Architecture practice defining objective requirements, patterns for delivery, and review practices to assess alignment (data creation, classification, storage, transmission, manipulation, archiving, retention and destruction)
  • Create security posture for athena to protect the platform,software applications and internal systems
  • Create a strategy and roadmap, working with multiple internal teams to make sure we are executing on strategy
  • Act as a funnel for all things security and be able to triage issues and formulate response to the outside world
  • Develop Enterprise Risk Management strategy in partnership with legal and compliance teams
  • Talent Management
  • Requires 15+ years of relevant experience
  • Masters in Computer Science or another relevant technical/engineering degree
  • Maintain current knowledge of HIPAA, NIST, PCI-DSS requirements
  • Maintain current knowledge of cybersecurity technology
  • Knowledge of Risk Management techniques to defeat advanced attackers
  • Experienced performing malware analysis and incident response
  • Ability to work with highly confidential information
  • Influences various groups and stakeholders to obtain buy-in and participation without needing direct control
  • Strategic and technical thinking-understanding of systems, infrastructure and various types of software applications and platforms
  • Organizational leadership and support; know when to get involved and at what intensity and how to support the project at hand
  • Communicates effectively; conveys a clear understanding of the unique needs of different audiences
  • Collaborates well with cross functional executive-level peers; able to drive decisions when consensus is lacking
  • Makes good and timely decisions that keep the organization moving forward
  • Builds effective teams; attracts and develops top talent to meet current and future business needs
  • Takes on new opportunities and tough challenges with a sense of urgency, high energy and enthusiasm
  • Builds strong customer relationships and delivers customer-centric solutions
  • Creates an environment where people are motivated to do their best to help the business achieve its objectives
  • Cultivates innovation allowing for new and better ways for the company to be successful
  • Employs a strategic mindset; can see ahead to future possibilities and can translate them into breakthrough design strategies
73

Information Security Architect Resume Examples & Samples

  • Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents
  • Must be able to pass a Public Trust Level 5 background investigation
  • Familiarity with Electronic Health Records highly desired
  • Familiarity with Agile Software Development Lifecycle (SDLC) Methodology highly desired
  • Familiarity with Source Code Control/Version Management software desired
  • Knowledge of the VistA electronic health record or Resource Patient Management System (RPMS) preferred
  • Working knowledge of MS Team Foundation, VersionOne and/or JIRA is preferred
  • Expert knowledge of data security administration principles, methods, and techniques
  • Certification in one or more specific technologies may be required, depending on job assignment
  • CISSP certification strongly desired
74

Enterprise Information Security Architect Resume Examples & Samples

  • Works closely with IT architects, other functional area architects and security specialists to ensure proposed architecture designs for eCommerce and Infrastructure related projects are designed with information security best practices based on level of risk
  • Ability to analyze and assess projects, vendors, technology requests to align process and architectural designs with security best practices and standards
  • Develop the methodology for integrating strong security governance procedures with an eCommerce Agile Project Management delivery methodology
  • Develops the process to create, review, approve and track information security standards with a specific emphasis on WebSphere Commerce based web solutions, SAP backoffice systems and infrastructure related initiatives
  • Prior experience with SAP applications (i.e. ECC) and architecture is preferred
  • Develops the information security strategy and approach for initiatives including but not limited to PKI, Single-Signon, Two factor Authentication etc,
  • Serves as an eCommerce and Infrastructure subject matter efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Communicates security risks and solutions to business partners and IT staff
  • Develops the information security playbook which documents the expected information security guiding principles, procedures and standards based on level of risk
  • A bachelor's or master's degree in computer science, information systems or other related field; or equivalent work experience
  • Demonstrated senior level expertise in eCommerce architecture design/implementation and Infrastructure design/implementation (.i.e. network, storage, virtualization, database, cloud etc.)
  • Formal training in a relevant enterprise architecture methodology is preferred (for example, the Zachman Framework or TOGAF)
  • 10-15 years of combined IT and security work experience, with a broad exposure to infrastructure/network and multiplatform environments
  • Expert knowledge of eCommerce and other web architecture designs, WebSphere Commerce focus preferred
  • Expert knowledge in infrastructure architecture design with a focus on cloud architectures including Microsoft Azure, Office365, AWS etc
  • Prior experience using an enterprise architecture methodology (for example, Zachman, TOGAF and Gartner frameworks) to establish As-Is and To-Be Architecture roadmaps, Impact Analysis dashboards, strategic alignment, Risk Portfolios etc
  • A foundational knowledge of information security related standards like PCI
  • Proven ability in the architecture space to develop processes, sustainable and flexible architectures and organizational designs
75

Information Security Architect Resume Examples & Samples

  • Design, document & build implementation patterns for common core functions, including data classification, identification, encryption and entitlement models
  • Assess, critique, improve and evangelise strategic control implementations from Cyber security and partner groups in Global Technology & controls functions
  • Partner with Cyber solutions incubation, vendors, engineering & line of business product development teams to deliver working prototypes through production products
  • Bachelor’s degree, or demonstrated experience and delivery, in computer science, information security, engineering, or related discipline
  • 7+ years of progressive experience in designing & developing foundational application components, core infrastructures and critical customer facing system development
  • Demonstrable experience of strong Java, .NET and/or python delivery of critical application frameworks
  • Demonstrable experience developing and delivering core technologies to include
76

Information Security Architect Resume Examples & Samples

  • Must be experienced with common platforms and technologies such as Microsoft, Oracle, Linux/Unix, VMware ESX & NSX, Cisco, Fortinet, Symantec, etc
  • Must be experienced with general technical architecture components e.g. network segregation techniques, web servers, application servers, load balancing, HTTP routing, network routing & switching, identity management, authentication, auditing, access control, storage, logging, remote access solutions, etc. Ideally with an implementation background
  • Must be experienced with cybersecurity controls including Firewalls, DDoS, IPS/IDS, Proxy Solutions, Web Application Firewalls, multi-factor authentication, PKI’s, anti-malware protections, anomaly detection, SIEM, etc
  • Plan, analyse, and design global security systems including network monitoring, intrusion detection and prevention, identity management, access control, mobile device management, and data protection. Initiate upgrades to security systems as necessitated by technology availability and maturity, security gaps, emerging threats, business risk and needs, and cost effectiveness
  • Experienced with mobility solutions including MXM (specifically MDM, MAM), auto-enrolment, and BYOD, as well as cloud solutions including identity management and synchronisation, Federation, ADFS, etc
  • Knowledge of modern application development methodologies and security techniques and tools which can be deployed and have a good understanding of risk management, security architecture, common design flaws/weaknesses, and vulnerability analysis
  • Must have prior experience in designing solutions and controls for regulated environments and must possess awareness and knowledge of SOX, COBIT, ISO\IEC 27001:2013, EU GDPR and/or NIST CSF standards
  • Must have a general understanding of data protection and privacy requirements and regulations, specifically the new General Data Protection Regulation and HIPPA
  • Prior experience in consulting is desirable
  • Strong communication skills (written & spoken) and interpersonal skills
  • Experience with working across business unit and geographical boundaries to engage team members required
  • Possessing security-centric certifications such as CSSLP, CISSP, Offensive Security OSCP or other certifications such as CISM, CISSP, CISSP-ISSAP, CEH, SABSA, TOGAF
  • Possessing a graduate or postgraduate degree in Computer Science, Engineering, Information Systems, Information Security, Mathematics, or a related technical field is desirable
77

Information Security Architect Resume Examples & Samples

  • 5+ years combined hands-on experience with information systems security, design, development, implementation and support
  • Industry certifications, such as CISSP, CISA, GSEC, etc
  • Thorough understanding of risk management principles and processes
  • Experience leading security assessments of large, enterprise-wide systems
  • Experience with hosted and cloud services, especially SaaS and PaaS, and the related security implications and control approaches
78

Information Security Architect Resume Examples & Samples

  • Ability to work closely with business units and ensure that security practices are integrated within their networks, systems, and applications
  • Technical expertise in applied cryptography as well as application, host, and network security, ideally including
  • Experience implementing Secure Development Lifecycle practices in large scale organizations
  • Understanding of security requirements and controls around Continuous Delivery / Continuous Integration
  • Background in securing multi-tenant ‘big data’ services, and/or architecting separation controls in ‘cloud’ systems
  • Familiarity with large scale network segmentation and emerging technologies in the Software Defined Networking space
  • Able to provide architectural guidance from high-level design to detailed (hands-on) implementation of security controls
  • Skilled in researching the latest security best practices, threats, vulnerabilities and technologies, and helping to disseminate this information to technical audiences
  • Understanding of global security and privacy regulation (PCI, ISO27001, GDPR, HIPAA, etc.)
79

Information Security Architect Resume Examples & Samples

  • Tool Management - Manage/Operate the existing tools like CA Control Minder (CA PIM)/CA Access Control, etc. in order to manage the security policy
  • Bachelor's degree in Information Security, Information Technology, Management Information Systems or equivalent work experience
  • Solid knowledge of CA COntrol Minder(CA PIM)/CA COntrol Minder including Installation, Configuration, Administration, Policy Development and Troubleshooting etc
  • UNIX shell scripting skill is a plus
  • Strong technical writing skills required
  • Must be able to work independently and in a team environment
  • Shell scripting experience would be a plus
80

Information Security Architect Resume Examples & Samples

  • Establish Enterprise Security standards, policies, guidelines, best practices, roadmap, and strategies
  • Provide input to system and technical documentation including creating technical diagrams
  • Review system technical design and project technical specification documents and approve when warranted
  • Assist development and technical staff with secure design practices and guide security staff in implementation and support of security systems and processes
  • Perform project management practices (PMP) required for projects and activities
  • Write or direct the writing of white papers and organize, create, and present presentations
  • Understand and devise IT approaches to comply with company security standards, rules and regulations (HIPAA, SOX, etc.)
  • Collaborate with entire Enterprise Architecture team to represent IT Security domain
  • Must comply with corporate compliance program
  • At least 10 years of experience in Information Technology and Services preferred
  • Requires a minimum of five (5) years experience in a lead or senior role as Security System Analyst or Infrastructure Administrator designing and implementing a wide variety of Infrastructure and Application security controls
  • Preferred experience with a multi vendor hardware and software environment
  • Proven analytical aptitude of reviewing requirements, researching options, identifying their impact on the existing infrastructure, and implementing
  • Proven experience in designing and developing applications that interact with multiple systems that support complex business processes preferably in a sensitive data environment
  • Proven ability to share and present ideas orally and in writing to senior staff members, business clients, and technical resources in a clear concise manner
  • Experience in project management regarding multiple IT teams and business stakeholders
  • Experience with LDAP, Cloud Security, Mobile/Endpoint Security, and Network Security/Design is preferred
81

Information Security Architect Resume Examples & Samples

  • Information security management systems
  • Identity and access management
  • Data loss prevention
  • Security incident and event management
  • Source code analysis (C#, JavaScript)
  • Server security
82

Information Security Architect Resume Examples & Samples

  • 5-7 years minimum experience in a primary role as an information security expert
  • Understanding of Information Security technologies (Firewall, IPS, IDS, SIEM, etc.)
  • Knowledge of security policies, regulations, compliance issues, processes and standards ( e.g. ISO, ITIL, PCI-DSS, ITAR, NIST)
  • Proven project management skills and leading cross functional efforts
  • Ability to work in a fast paced, dynamic environment
  • Strong customer service, analytic, communication (oral and written) and troubleshooting/problem solving skills
  • High performance and standards as demonstrated by academic or previous job experience
83

Enterprise Information Security Architect Resume Examples & Samples

  • PRIMARY DUTIES AND RESPONSIBILITIES
  • Requires in-depth knowledge of security issues, techniques and implications across all existing computer platforms
  • Ability to prioritize work load and consistently meet deadlines
84

Principal Information Security Architect Resume Examples & Samples

  • Minimum 6 years of experience in networking technologies with emphasis on Cisco firewalls and routers, IDS/IPS systems and load balancers etc
  • Must have a thorough understanding of security requirements and best practices around network design, application security and implementation
  • Experience with secure application development process
85

Information Security Architect Resume Examples & Samples

  • 8+ years of information technology experience and/or business experience
  • 8+ years of experience working with applications, data, infrastructure, and/or IT security
  • 5+ years of experience in IT security, compliance and risk management, including privacy, controls, etc
  • 5+ years of experience with compliance & security standards across the enterprise IT landscape
  • 4+ years of experience in designing, building and deploying multi-tiered applications and networks
  • 4+ years of infrastructure experience in 1 or more components, i.e., communications, private/public network, network access security, database and information access security, middleware, computing hardware, operating system
  • 3+ years of experience building enterprise security strategy for cloud adoption or driving the program's evolution to meet new requirements
  • 1+ years of hands-on technical expertise in Security Architecture, automation, integration, and deployment (DevOps)
  • Significant technical expertise in Cloud Computing technologies (CASB, AWS, Azure, etc.), including design, implementation, integration and security assurance, and proven experience building security reference architecture for all-in cloud deployments and hybrid scenarios
  • Experience with enterprise security solutions such as WAF, IDS/IPS, Anti-DDOS, Logical Access, Password Vaults, Anti-virus and Malware, Vulnerability Scanning, Data Loss Prevention and SIEM solutions
  • Experience with the NIST Cybersecurity Framework, COBIT, SANS CSCs, ISO 27k, TOGAF, CASB, OWASP or similar frameworks and methodologies
  • Experience working with the FFIEC Cybersecurity Assessment Tool (CAT)
  • Ability to correlate business process knowledge with technology and security solutions while ensuring those solutions fit well within the Deere environment and architectural tenets
  • Deep understanding of risk management methods and techniques to drive successful outcomes in a global environment
  • Understanding of security as it relates to computer technology, methodology, and full life-cycle development. Understanding of applications development environment, database, data management and infrastructure capabilities and constraints and how it relates to information security
  • Familiarity with compliance & security standards across the enterprise IT landscape and in helping design and embed effective security controls
  • Strong and broad understanding of IT processes and technologies
  • Degree in an Information Technology discipline or equivalent experience
  • Certification as a Certified Information Systems Security Professional (CISSP), or similar, is highly desired
86

Senior Information Security Architect Resume Examples & Samples

  • 7-10 years' experience architecting solutions
  • Experience communicating with business partners
  • Use of security patterns and security best patterns such as threat modeling
  • At least three (3) years of experience with security technologies, such as intrusion detection/prevention, event correlation, firewall, antivirus, anti-spam, policy enforcement, patch/configuration management, audit, secure application development
  • 10-15 years' experience in Information Security
  • Big Data Security including Hadoop security and emerging technologies such as im-memory and NoSQL
  • Experience in delivering comprehensive architecture specifications for complex security
  • Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS SQL Server Microsoft Outlook, J2EE applications
  • Experience with applicable control frameworks and compliance mandates like PCI, FISMA, HIPAA, and CoBIT is highly preferred
87

Senior Information Security Architect Resume Examples & Samples

  • Security Systems Practices/Protocols: Develops and implements network security plans, both internally and externally; develops and communicates the practices and protocols to maintain a secure environment
  • Security Technologies: Knowledge of security technologies, including access control, encryption, authentication, non-repudiation, security auditing, systems disaster recovery and workplace recovery
  • Has a deep understanding of security controls and in-depth knowledge of how security technologies work – web proxies, email gateways, SPAM filters, WAF, DDOS Protection etc
  • Individual must possess excellent interpersonal skills
  • Effective communicator: Compelling and effective at communicating with and presenting to executive management. You will be able to articulate and sell your product vision to stakeholders, and also to your agile delivery team. You will have a strong vocabulary in design, technical and agile language
  • Collaborator: You will need to work closely with multiple teams to achieve your goals but also be able to bring intent owners and other stakeholders along with you
  • Influencer: You will have the ability to influence at varying levels of people seniority
88

Information Security Architect Resume Examples & Samples

  • Security fundamentals with a solid understanding of threats, vulnerabilities, risks, defenses, security principles and policies
  • Strong foundation in network security technologies such as firewalls, remote access, application security, device hardening, intrusion detection and prevention, network segmentation, encryption, mobility, collaboration, etc.
  • Mobile device security best practices, endpoint posture assessment, device management and cloud integration capabilities
  • Systems architecture, design and operational experience
  • Experience with cutting edge datacenter and network virtualization technologies
  • Applied conceptual and analytical thinking, problem solving skills
  • Consulting and partnering skills with enterprise perspective and influence
  • Solid presentation, demonstration and written communication skills
  • Ability to work in a global, multi-cultural team setting
  • A genuine sense of curiosity and a love for learning
  • Ability to speak both the language of technology as well as the language of the business
89

Information Security Architect Resume Examples & Samples

  • Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience
  • Typically Minimum 8+ Years Relevant Exp
  • Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; proven experience working with security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act)), etc.). Knowledge of industry standard security compliance programs ((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.)
  • Skills / Knowledge - Having broad expertise or unique knowledge, uses skills to contribute to development of company objectives and principles and to achieve goals in creative and effective ways. Barriers to entry such as technical committee review may exist at this level
  • Job Complexity - Works on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Creates formal networks involving coordination among groups
  • Supervision - Acts independently to determine methods and procedures on new or special assignments. May supervise the activities of others
90

Information Security Architect Resume Examples & Samples

  • Help to set strategic direction for information security initiatives, processes, and standards
  • Research, evaluate, and drive next generation security technologies and concepts to keep security ahead of the curve
  • Build relationships and collaborate with other architects across IT to ensure that all visions are aligned
  • Conduct and attend project meetings to provide security and governance input throughout project lifecycles
  • Influence decision makers in the areas of secure network design, access/authentication controls, IaaS, and others
  • Coordinate risk assessments of IT projects and systems
  • Create, refine, deliver and evangelize information security standards to be used throughout the enterprise that balance business need and external requirements
  • Create end-to-end security solutions involving a mix of technical and organizational requirements
  • Monitor changes in the legislative, regulatory, and contractual landscape to ensure that the information security program is always at least one step ahead
  • Mentor more junior information security team members
91

Senior Information Security Architect Resume Examples & Samples

  • Builds consensus around principles of security architecture and interprets and clarifies these principles
  • Provides technical guidance to less experienced Security Architects
  • Provides guidance on security solutions and prepares benchmarking reports and presentations
  • Information Security certifications preferred (CISSP, CISM)
92

Information Security Architect Resume Examples & Samples

  • 5+ years direct information security experience - including research, design, build, deployment, operation, and support phases
  • Deep technical understanding of and experience with security technologies including, but not limited to, intrusion detection/prevention, event correlation, firewall, antivirus, anti spam, policy enforcement, patch/configuration management, audit, application whitelisting, secure application development, etc
  • Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), MS SQL, Server Microsoft Outlook, etc
  • Experience in data exfiltration techniques and detection and response tools and strategies
  • Experience?with designing and implementing secure networks
  • Experience?with secure data communications and applications
  • Comfort working across multiple computing platforms. (Windows, AS/400, zOS)
  • Knowledge of SANS 20 critical controls framework and other security frameworks and regulations (HITRUST, NIST, ISO, HIPAA)
  • Experience with both on premise and cloud based security solutions preferred
93

IT Information Security Architect Resume Examples & Samples

  • Develop roadmaps that define the future state technology architecture and recommend where and when work will be done to evolve to this future state
  • Participate in the selection of hardware and software products and participate in the planning for which features get implemented on what timeline
  • Conduct research on emerging technologies for the purpose of evaluating and recommending those that will increase performance, reliability, cost effectiveness, infrastructure flexibility or otherwise provide value to our business
  • Participate in annual technology planning to identify where technology investments are needed and where technical architectures need updating
  • Participate on application or infrastructure implementation projects to insure the design conforms to the technical architecture and standards, and modify or extend the technical architecture when it is necessary to accommodate project needs
  • Oversee or consult on technical architecture implementation and provide technical expertise, direction and assistance whenever you have the needed skills to solve a problem
  • Establish and maintain relationships with technology vendors
  • Ability to make sound and logical judgments
  • Demonstrated leadership and personnel/project management skills
  • Good understanding of the organization’s goals and objectives
  • Strong interpersonal, written and oral communication skills
  • Ability to perform general mathematical calculations for the purpose of creating needs assessments, budgets, and so on
  • Able to conduct research into issues and products as required
  • Ability to prioritize and execute tasks in a high-pressure environment and make sound decisions in emergency situations
  • Ability to present ideas in a user-friendly language
  • 15 plus years of experience conceiving, architecting, engineering, and administering security technology in a distributed environment with capabilities in a at least 5 of the following IT disciplines and technologies
  • Security architecture, infrastructure architecture, identity and access, encryption technology, perimeter security, network, middleware, desktop, storage, relational databases, layered software services like system monitoring, scheduling and backup/recovery, application development, disaster recovery, servers (Windows and Unix platforms), enterprise voice and collaboration, and virtualization technologies
  • Solid understanding of IP-based network architecture and contemporary virtualization technologies
  • Proven success on projects with large-scale deployments
  • Understanding of application life-cycle management methodology is preferred
  • Knowledge of architecture concepts, industry standards, and best practices
  • Knowledge of TOGAF and certification a plus
  • Exposure to multiple, diverse technical configurations, technologies and processing environments
  • Basic knowledge of financial models and budgeting and having the ability to estimate the financial impact of technical architecture alternatives
  • Excellent listening, written and verbal presentation skills, strong data-based, analytical and reasoning skills, sound decision-making and organizational ability
  • Ability to work in a matrix team environment and familiarity with ITIL methodology and practices a plus
94

Senior Information Security Architect Resume Examples & Samples

  • A minimum of 10 years of IT experience and 5 years of Information Security experience
  • A minimum of 3 years of experience (5 years is preferred), serving in a Security Architect position
  • A minimum of 3 years of experience supporting a technically diverse Cardholder Data Environment (CDE). Cloud Security experience (AWS and Azure), including both IaaS and PaaS models
  • Working knowledge of one or more security and IT Architecture standards, including COBIT, TOGAF, Open Security Architecture, or Service Oriented Modeling Framework
  • Demonstrated experience in the following areas: cloud, firewalls, intrusion detection & prevention, perimeter appliances, domain segmentation, filtering (virus, spam, etc.), network segmentation, authentication, enterprise portals, portal based access managers, database encryption, data encryption, host intrusion detection, enterprise directories (LDAP and Active Directory), and meta-directories
  • Industry certification in security (e.g. CISA, CISSP, and/or GIAC)
  • Strong PCI DSS knowledge and experience
  • Ability to lead, build and develop team of senior IT professionals through formal and informal reporting relationships
  • Proven experience in developing and executing plans, meeting deadlines, and operating under tight time constraints; monitoring trends in information technology, identity & access, and security that could have an impact on the security of the organization's products, processes, infrastructure, or customers
  • Demonstrated ability to influence and clearly communicate across vast sections of IT and the business, including company leaders
  • Demonstrated experience in making articulate and effective verbal and written presentations to different audiences
  • Excellent organizational and leadership skills
  • Demonstrated business acumen
  • Excellent clear and concise verbal and written communication skills
95

Information Security Architect Resume Examples & Samples

  • Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; and identifying integration issues
  • Develops business-appropriate information security strategy and architecture documents that address information risk, working with multiple stakeholders in the Office of Information Security and Mayo Clinic leadership, as well as consulting and leveraging industry experts and best practices
  • Acts as a senior subject-matter expert on information security topics and trends, advising business and technology colleagues on Network, Identity, Cloud, and Endpoint security architecture
96

Information Security Architect Resume Examples & Samples

  • Assisting in the development of a strategic security architecture vision, including standards and frameworks that are aligned with overall business strategy using the current technology roadmap
  • Work closely with chief information security officer, enterprise architecture, solution delivery, infrastructure, external partners and operations teams
  • Participate in solution architecture design; lead security efforts assisting with the integration and initial implementation of solutions
  • Participate in Architecture Review and Security Review boards to define overall execute the overall strategic Information Security direction and work with cross-organizational IT areas
  • Achieve security architecture compliance on requirements, including: Sarbanes-Oxley, payment card industry standards, HIPAA/HITECH, global data privacy requirements, as well as state and federal regulations
  • Stay abreast of new security technologies and integrate into security architecture design when appropriate
  • Meet with project teams and other system architects to develop system designs and project plans that include the appropriate security controls and meet security standards
97

Information Security Architect Resume Examples & Samples

  • Provide security architecture and advice in support of application development, infrastructure, and enterprise technology projects to ensure the integrity of the Wintrust architecture
  • Define, document and implement the application security architecture for Wintrust including but not limited to the following
  • Work with Security Architecture Team to establish information security architectural requirements and controls for the organization
  • Be actively involved with application development and technical projects – from scoping to completion – to ensure that information security needs are being met
  • Review system build processes and certify them before release to production
  • Be a participating member in the change management review process
  • 3-5 years of experience
  • Bachelor degree or equivalent
  • Must have very good organizational skills, an attention to detail, very good written and verbal communication skills, along with interpersonal and customer service skills
  • Resolves non-routine problems with specialized knowledge
  • Demonstrates considerable judgment in selecting methods
  • Utilizes established procedures but decides action within task
  • Minimal travel, Less than 10%
98

Information Security Architect Resume Examples & Samples

  • Partnering with the Security and Enterprise Architecture teams during the defining stages of the project to ensure the accuracy of business cases and that the solution will meet the business need
  • Adhering to the established life-cycle methodology and practices in accordance to project plans while carrying out their responsibilities
  • Both individually and leading a team of resources, using current programming language and technologies, writes code, completes programming, and performs testing and debugging of applications
  • Completing documentation and procedures for installation and maintenance
  • Interacting with partners to define system requirements and/or necessary modifications
  • Providing technical guidance to less experienced developers
  • Reviewing and/or certifying code of others
  • Demonstrates technical leadership aligning application functionality with business requirements and strategy
  • Experience anticipating issues and challenges affecting application functionality while reviewing and validating new application solutions and establishing effective monitoring of software processes
  • Experience designing, building and implementing enterprise-class systems for a production environment
  • Experience with Identity and Access Management
  • Demonstrated expertise in: VB.NET, Java /J2EE, ColdFusion, API/Web Services, Scripting languages, and RDBMS such as MS SQL Server and Oracle
99

Information Security Architect Resume Examples & Samples

  • Undergo a criminal history investigation
  • Tax filing records will be checked prior to job offer
  • Post-offer medical/physical examination and the ability to reasonably accommodate any restrictions are conducted on some required positions
  • Obtain a valid driver’s license with no major driving citations in the last 39 months is required for all positions where driving is an essential function of the job
  • All newly hired employees will be subject to E-Verify Employment Eligibility Verification program
100

Information Security Architect Resume Examples & Samples

  • Provide strategic guidance and governance for new solutions to meet business-aligned, security and compliance goals
  • Develop target state security architecture and baselines for security capabilities, technical and process driven controls, and related security policies and procedures unifying these elements into a cohesive unit
  • Build security roadmaps detailing strategy, budget and ROI benefits that meet the target state architecture and HLI business needs
  • Design enterprise security reference models, standards, and patterns to guide and govern IS project delivery
  • Monitor and analyze immerging threat trends to ensure HLI’s security architecture and protection mechanisms address potential vulnerabilities
  • Assist with identifying, developing, and leading innovation initiatives including proof-of-concept exploration
  • Participate in architecture reviews for guidance and adherence to HLI’s security policies and standards
  • Translate complex technical issues into business language and then present to a broad audience
  • Provide technical security leadership in the analysis, design, and support phases of application and system development across all HLI departments and organizations
  • Prepare and periodically updates information security policies, architectures, standards, and/or other technical requirement documents
  • 4 years of direct managerial experience
  • Expert knowledge of the international standard for information security FISMA/NIST
  • Expert knowledge with at least one development language with preference for Python, .NET or Java especially in an enterprise environment
  • Extensive experience in Enterprise Security document creation
  • A successful track-record and at least seven years’ experience being responsible for administering, operating, maintaining, and developing information security, security architecture and security policy
  • Sound knowledge of various security standards and guidelines (ISO 27002, PCI and CFR 21 Part 11)
  • Broad understanding of cloud technologies including Amazon AWS, DevOps orchestration and the management of security in these environments
  • Broad understanding of how to conduct risk assessments and the associated methodologies involved in risk mitigation and the presentation of this work encompassing deep knowledge of firewalls, intrusion detection systems, anti-virus software, hubs, switches, routers, data encryption, and other industry-standard techniques and practices
  • Flexibility and adaptability in work approach
  • Ability to work under pressure and be results-orientated
  • Demonstrated leader with team-oriented interpersonal skills; ability to effectively interface with a broad range of people and roles
101

Information Security Architect Resume Examples & Samples

  • Develop and maintain security policies
  • Review contract language in regards to security requirements
  • Provide business guidance to management and internal partners
  • Communicate security requirements by evaluating security exceptions, client contracts, client requirements, etc
  • Strong associate- and client-facing presentation and facilitation skills
  • Familiar with contract language
  • Familiar with NIST controls
  • Ability to craft and articulate security policy that aligns with business goals and realities
  • 2+ years of Security compliance experience
  • Live in or willing to relocate to Kansas City area
  • Receipt of the appropriate government security clearance card applicable for your position
  • Experience with ISO 27001 security controls
  • Security Certification(s)
102

Information Security Architect Resume Examples & Samples

  • A bachelor’s degree in computer science, computer engineering, networking or related field required; master’s degree preferred
  • Linux, Windows, Z/OS or hybrid experience
  • An information security related certification such as CISSP, CISA or GIAC is required
  • 10 or more years of experience in information technology with at least five years of experience in information security
  • Experience evaluating, designing and implementing security solutions
  • Experience in two or more of the following: Firewalls, intrusion prevention and detection, network segmentation, authentication, enterprise portals, virus and spam filtering, database encryption, Active Directory, data encryption, host intrusion prevention, data loss prevention technologies, security hardening techniques, identity and access management solutions
  • Insurance industry experience preferred
103

Information Security Architect Resume Examples & Samples

  • Strong knowledge of information security principles and practices
  • Strong knowledge of cloud technologies and architectures, particularly IaaS, PaaS and SaaS
  • Strong ability to act as an “internal consultant”, to assist the Operations and Business units with understanding and applying Cyber security principles while also helping drive the organization’s security priorities into these areas
  • Clear ability to communicate persuasively with senior executives up to C-level
  • Ability to help prepare and justify an information security budget
  • Solid understanding of Operating System security concepts
  • Solid Understanding of malware, emerging threats, attacks, and vulnerability management
  • Strong track record of effective project management and project delivery
  • Strong deductive reasoning, critical thinking, problem solving, and task prioritization skills
  • Strong service mentality including the resolution of stakeholder escalations and incident management
  • Strong team player who collaborates well with others to solve problems
  • Strong interpersonal, problem solving, and communication skills
  • Ability to work in a virtual team environment
  • Ability to present complex solutions and methods to both technical and non-technical stakeholders
  • At least 8-10 years of experience in information security or related technology experience required, experience in the health and life sciences industry is a plus
  • 1-2 years of experience managing people, and ability to take on the management of a team as the function matures
  • A CISSP, GIAC, or equivalent certification
  • Knowledge of ITIL or another ITSM methodology or certification is a plus
  • Previous experience as a Security Architect, internal Security Consultant, or related capability in a related corporate environment
  • An advanced degree (Master’s or Doctorate) in Information Security is preferred
104

Senior Information Security Architect Resume Examples & Samples

  • Evaluating network and security technologies; developing requirements for Cloud and Enterprise networks (LAN/WANs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards
  • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and completing documentation
  • Facilitate setting up a Application Security program in coordination with Product Development department that ensures secure development practices within JDA Products
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; developing and conducting training programs
  • Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends
  • Protect JDA, customer information, and IT Services infrastructures from external and internal threats
  • Acts as the Subject Matter Expert (SME) for security policy and procedure, security design and implementation, and incident response and mitigation
  • Educate employees about their information security and privacy protection responsibilities
  • Conduct the information security risk assessment. Review compliance with the information security policy and associated procedures
  • Assist in coordinating contingency plan tests on a regular basis
  • Participate in and assist with incident response team, as appropriate
  • Assist compliance organization with incident response plan, breach notification policy/process, reporting obligations review, data mapping, privacy policy, law enforcement referral policy, vendor negotiations, contract review for the enterprise
  • A Bachelor’s Degree in Information Systems, Computer Science, or Computer Engineering and work with a minimum 10 years’ experience
  • Expert knowledge of cloud based operations and how to secure applications, software development and operations from a cloud perspective
  • Significant knowledge on security trends and continued awareness of federal, national and international legislation in both Cloud and On Premise services
  • Demonstrated experience in designing, developing and delivering security solutions in a multicultural environment
  • Demonstrated experience evaluating, planning and implementing enterprise security technologies with knowledge of IT networking and IT Systems security best practices
  • Familiarity with international security standards, experience with continuity of operations, vulnerability assessments and cyber-security
  • Ability to learn and gain a deep understanding of all facets of enterprise applications and write complex technical documentation
  • Extensive experience with systems security tools and techniques
  • Facilitation and team-building skills at all levels including the ability to influence, train, mentor and leverage the skills of others, including business partners and international technical team members
105

Information Security Architect Resume Examples & Samples

  • ISACA Certified Information Security Manager
  • At least 7 years of experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data
  • Computer crime
106

Enterprise Information Security Architect Resume Examples & Samples

  • Coordinate with various project teams to communicate the necessity of security requirements and design constraints
  • Analyze and make recommendations to improve network, system and application architectures, designs, and implementations
  • Responsible for the creation, review, updating, implementation and documentation of the Security system and application security architecture and data flow diagrams
  • Contributes to the development and maintenance of the Information Privacy and Security Office Services Catalog and Corporate Information Security policies and procedures
  • Design, review, and approve information security architecture, including but not limited to
  • Bachelor's Degree in Information Systems, Computer Science (or equivalent) is required
  • Five (5) years direct and hands-on experience in network layer technologies and security architecture designs
  • Ten (10) years of overall work experience in IT, Information Security or related field
  • HIPAA (or SOX), Payment Card Industry Data Security Standard (PCI DSS), knowledge required
  • Highly seasoned in organizational, time management, decision making and problem solving skills
  • Working knowledge of IT systems and functions, process development, change management, and software review processes
  • Strong organization skills to prioritize work, balance and lead complex initiatives
  • Strong experience performing detailed analysis of network security infrastructure components (networking, firewalls, servers, IPS/IDS) and assessing the effectiveness of its security implementation
  • Strong experience of the TCP/IP protocol stack and application protocols such as DHCP, SNMP, DNS, etc. IPSec and SSL VPNs along with SSL/TLS protocol understanding
  • Experience planning security systems by evaluating network and security technologies; developing security requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, IPSs, WAP and related security and network devices; designing public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards
  • Experience reviewing network and security architectures and providing guidance for deployment of new technologies and integration with existing technologies
  • Strong leadership skills to effectively mentor and lead junior level personnel
  • Strong hands on architect/engineering level expertise of Security DMZ and border security architecture
  • Experience with Visio programs to create detailed physical and logical network diagrams Strong analytical and creative problem solving skills for design, creation and testing of complex systems
  • A service focused team player who has the ability to lead and mentor team members
  • Excellent customer service and interpersonal skills demonstrated both over the phone and face-to-face in order to communicate technical information in non-technical terms
107

Senior Information Security Architect Resume Examples & Samples

  • Design architecture, methods, and controls required to meet security, compliance, and audit requirements
  • Proactively stay current with developments in relevant technologies
  • Create and share unique ways to solve challenges with others
  • Deploy security solutions in cloud environments
  • In-depth knowledge of VPCs, Security Groups, and ACLs
  • Monitor system logs, SIEM tools and network traffic for unusual or suspicious activity
  • Must have experience extracting pertinent security data from SIEM solutions and AWS audit, logs, and reports
  • Develop program quality metrics as both program performance indicators and enterprise risk indicators
  • Respond to, and when appropriate, resolve and/or escalate security incidents
  • Report unresolved security exposures, misuse of resources, and noncompliance situations using defined escalation processes
  • Assist and train team members in the use of cloud security tools and the resolution of security issues
108

Senior Infrastructure & Information Security Architect Resume Examples & Samples

  • Understand technical solutions to develop integrated solutions to resolve highly complex technical and business issues
  • Recognized expert internally and externally within a discipline(s) and often provides strategic direction, guidance and integration of products and services
  • Lead Development and Design Efforts across teams
  • Responsible for leading a team that evaluates business process and application software, which affect the integrity, functionality, and reliability of the bank's network and systems
  • The responsibilities extend to designing and leading pro-active reviews and self-assessments of the systems established
  • Assess effectiveness of designed controls. Integrate information and network security solutions
  • Provides technical expertise and support to business lines
  • Generally assigned the Project Manager of the most complex projects, including the development of detail project plans, preparing detailed task plans outlining all requirements to implementation
  • Assignments include and ate not limited to central mainframe and distributed computer systems, Internet, Intranet, and Extranet networks and components and other points of access to these networks
  • Responsible for providing formal stand-up presentations to all levels of Bank management and to prepare detailed project proposals which include detailed justifications, cost estimates, manpower requirements, etc
  • Lead responsibilities include training or mentoring staff to effectively apply information security theories and concepts to specific circumstances
  • Provides technical work direction to the staff who monitors, develops and maintains security policies and procedure
  • Analyze trend /data for long range planning to management
  • Provided input to the overall strategic direction to Management. Ensures any division wide strategy is implemented with assigned areas/systems
  • Responsible for responding to information security related problems
  • Assess issues / problems and take immediate corrective actions if appropriate
  • Analyze various methods of controlling information security problems, determine the strengths and weaknesses of each method and implement the best cost justified solution
  • Processing access requests, performing certifications, answering phones, supporting users
  • This position may also be assigned a small staff to supervise
  • Duties include directly supervising staff, including interviewing, hiring staff and the termination of staff; recommending salary changes, job promotions; setting work hours, conducting counseling /performance reviews, and planning of the staff ‘s work
  • Must have detailed knowledge of several operating and corresponding security systems
  • Maintain certifications for security and information systems
  • Outstanding oral and written communications skills
  • Knowledge of basic banking concepts and theories.. A thorough knowledge of security software packages and operating systems in use at the bank, networking concepts, and information security principals. Able to create native productivity aids and command scripts
  • Have a thorough understanding of personal computers and software productivity packages like Microsoft Office, Access, Excel, and terminal emulation software
  • Education BS or BA preferred
109

Information Security Architect Resume Examples & Samples

  • Expert knowledge of IT security standards and best practices
  • Evaluates and provides high and low level security design recommendations to mitigate risks
  • Develops and maintains security standards, baselines, and guidelines
  • Supports technical teams in architecting, implementing and securing systems, networks, applications, etc
  • Conducts technical security gap analysis and provides solid mitigating controls
  • Stays on top of industry security technologies and best practices
  • Looks for ways to integrate security technologies effectively and efficiently
  • Works closely with Security Analysts, Engineers and other teams
  • Participates in Security Incident Handling Response teams
  • Fosters relationships between peers, management, and business partners to ensure that common goals are met and that there is active collaboration between team members
  • Acts as SME to Product Groups during and after security incidents
  • Performs other duties as assigned by the Director of Information Security
  • Minimum of 10 years working as IT Security Network Engineer, Security Analyst, Pen Tester, or similar role
  • In depth experience designing and implementing enterprise security solutions for large distributed environments
  • Strong knowledge with security controls in manufacturing and Industrial Control Systems
  • Strong knowledge of application, database and network vulnerabilities and how to remediate them
  • Strong knowledge of software development security standards
  • Strong knowledge of data encryption methods
  • Strong knowledge of forensic tools/processes (e.g. Encase, FTK, etc.)
  • Strong knowledge of penetration testing (e.g. whitehat, blackhat, etc.)
  • Strong knowledge with security technologies/tools (e.g. IPS, SSL/TLS, etc.)
  • Strong network technical skills, includes TCP/IP, networking routers, switches, hubs, and OSI layers
  • Knowledge with Enterprise Resources Planning software (e.g. Infor/M3, Lawson, SAP, Oracle, etc.)
  • Expert knowledge with Microsoft technologies (e.g. Active Directory, SQL database, Windows severs, etc.)
  • Preferred experience with IBM technologies (e.g. AS400 iSeries Systems, etc.)
  • In depth understanding of Identity & Access Management principles
  • Strong knowledge of Microsoft Office suite (e.g. Office, Excel, PowerPoint, Visio, SharePoint, etc.)
  • Strong knowledge about IT Processes (e.g. Change Management, SDLC phases, Business process, Business Continuity, Disaster Recover, etc.)
  • In depth knowledge of industry best practices and frameworks (e.g. ISO 27001, NIST, OWASP, etc.)
  • Ability to conduct research into security issues, standards, and products
  • Ability to create technical security architecture diagrams and documentation
  • Expertise level knowledge of developing project plans, work programs, evaluating controls, documenting results, making recommendations and communicating information to all levels of management
  • Ability to manage multiple projects, meet deadlines while ensuring quality and performance
  • Strong written, oral, and interpersonal skills
  • Willingness to travel up to 25% within North America
  • A Bachelor’s degree from a nationally accredited University/College in Information Security, Computer Science or Information Systems, Computer Engineering, Technology Business or a related discipline or equivalent work experience
  • At least one professional certification, such as, CISSP-ISSAP, TOGAF, CCIE Security, CSSA, MCSA, is required
  • Master degree or Information Security related certifications such as, CISSP-ISSAP or TOGAF