Security Architect Resume Samples

4.9 (115 votes) for Security Architect Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security architect job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DC
D Cassin
Darron
Cassin
4307 Beau Route
Los Angeles
CA
+1 (555) 734 9754
4307 Beau Route
Los Angeles
CA
Phone
p +1 (555) 734 9754
Experience Experience
Los Angeles, CA
Security Architect
Los Angeles, CA
Howe-Upton
Los Angeles, CA
Security Architect
  • Leverage and develop our partners and cloud & managed service providers and relationships to key decision makers and influencers
  • Work with development teams to define and operationalize secure development practices
  • Use industry best practices framework, activities and tasks as a basis for developing cost and ROI estimate and develop overarching program plans
  • Proactively track gaps or conflicts in existing software development processes and highlight work with product development and engineering teams to remediate
  • Works closely with network, security and application engineers/developers to collaborate on secure solutions
  • Support the development of the ISMS, with support from other security and service management personnel and work
  • Develop test plans for security verification and assist development teams with security testing methodologies and tools
Phoenix, AZ
IT Security Architect
Phoenix, AZ
Dicki and Sons
Phoenix, AZ
IT Security Architect
  • Manage network intrusion detection and prevention systems
  • Works on improvements for added security services including the development of new tools and supporting assets
  • Work with network, platform, engineering and development teams in architecture design and review session
  • Assists with the development of corporate security policies and procedures
  • Provides expert knowledge of solution/application architecture as well methodologies for the software development life cycle
  • Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation
  • Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in overall processes
present
San Francisco, CA
Senior Security Architect
San Francisco, CA
Grant-Feil
present
San Francisco, CA
Senior Security Architect
present
  • Manage the design, development, test, launch, and continuous improvement of the firm’s cloud cybersecurity solutions
  • Risk analysis, risk management, and communication of results with software/hardware development managers
  • Manages and assists in performing security, usage and log monitoring following system procedures of all components of AMAG’s data infrastructure
  • Work with IT security and ensure a common security framework is established and operated as part of the SDLC lifecycle
  • Develop and manage Enterprise Architecture documents / artifacts from templates working with extended IT and Business teams
  • Provide Security Architecture design services to portfolio teams during their engagement within the established solutions development lifecycle (SDLC)
  • Manage the design, development, test, launch, and continuous improvement of the firm’s cybersecurity solutions
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
The University of Kansas
Bachelor’s Degree in Computer Science
Skills Skills
  • Excellent verbal and written communication skills. Ability to communicate effectively with customers, Marketing, senior management and engineers
  • Knowledge of
  • Experience working with remote development teams is strongly desired
  • Embedded and/or hardware security knowledge (identity, TPM, authentication, secure boot, etc)
  • Proficiency in establishing and maintaining effective working relationships with employees and clients
  • Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization
  • Possess one of the following certifications or be able to obtain within one year of hire
  • Excellent decision-making and problem solving skills
  • Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and schedules
  • Possess the following certification or be able to obtain within one year of hire
Create a Resume in Minutes

15 Security Architect resume templates

1

Identity & Access Management Security Architect Resume Examples & Samples

  • Augment and execute on an IAM roadmap that meets security requirements, including but not limited to security for, hybrid cloud deployment, B2B WebServices, Mobile computing, fine grained access control, policy driven security, SSO, user provisioning/de-provisioning, and federation focusing on multiple protocols (SAML, OpenID, Oauth)
  • Demonstrate extensive knowledge across a broad range of identity and access management technologies
  • Provide expertise in IAM architecture & technologies
  • BS or MS (preferred but not required) in computer science (or a technical field)
  • 8+ years' of software design and development, including at least 3 years developing/supporting/architecting custom software for large scale Identity and Access Management technologies
  • 5+ years' of relevant hands-on technical management experience of software developers/system administrators/architects as well as a record of individual technical achievement developing custom applications
  • Advanced security certifications a plus (CISSP Preferred)
  • Expert knowledge of three or more of the following technologies: Directory Services, Authentication/Authorization, Access Provisioning, Access Review, Public Key Infrastructure, Single Sign On, and Federation
  • The candidate must have hands-on experience developing and deploying large-scale enterprise Identity & Access Management solutions
  • Fluency in more than one technology stack and expertise in several of the following: C, C++, Java, sh/PERL/Python/PowerShell, UNIX/Linux, networking and network devices
  • Experience with AWS, Google Cloud, or Azure Cloud computing frameworks, infrastructure, and application environments
  • Demonstrated ability to effectively coordinate multiple priorities in a dynamic environment
  • Ability to articulate complex technical issues with both technicians and clients
  • Ability to compose and present material to communicate difficult concepts and gain consensus
  • Positive attitude, self-starter with strong analytical, communication and interpersonal skills to lead working groups, negotiate and create consensus
  • Ability to take a technology agnostic approach
  • Ability to communicate complex technical terminology, concepts and issues to technical and non-technical staff
  • Desire to learn and apply business subjects such as the level of return on a particular or combination of technology components proposed to a business line or initiative
  • Desire to follow and apply emerging cloud security framework standards (i.e. Cloud Security Alliance NIST
  • Knowledge of applicable SOX audit controls and applicability to IAM services architecture, design, and processes
  • Practical knowledge of industry standards and frameworks: ISO 27000 series, PCI, TOGAF
  • Java Application Interface Development and Object Models
  • Federation Protocols (Oauth, SAML, OpenID)
  • Advanced knowledge of LDAP and Active Directory
  • Cloud Platforms and Services
  • Single Sign On models / Web Server & App Server session management
  • RBAC methodologies
  • Adobe Flex
  • XACML
  • REST and REST Security
  • JSON
  • XML and XSLT
  • SOAP
  • Multi-factor Authentication (MFA) (i.e. Risk-based and Step-up authentication)
  • Enterprise Service Bus (ESB) technologies / JMS
  • Advanced systems design
  • Microsoft SQL server
  • Oracle RDBMS
  • SQL Databases
  • OpenAM, OpenDJ, OpenIDM
  • ILM, FIM
  • .Net
  • Windows Server 2008 R2 / 2012 R2
  • DNS, DHCP
2

Identity & Access Management Security Architect Resume Examples & Samples

  • 8 years' of software design and development, including at least 3 years developing/supporting/architecting custom software for large scale Identity and Access Management technologies
  • 5 years' of relevant hands-on technical management experience of software developers/system administrators/architects as well as a record of individual technical achievement developing custom applications
  • Fluency in more than one technology stack and expertise in several of the following: C, C , Java, sh/PERL/Python/PowerShell, UNIX/Linux, networking and network devices
3

Technical Security Architect Resume Examples & Samples

  • Minimum of 5 years of Technical Architect work experience
  • Solid skills in multiple programming languages, systems, as well as systems design
  • Knowledge of the overall business operating models and underlying technical architecture
  • Strong skills in of project management methodologies and tools
  • Strong middleware and internet technology experience
  • Strong skills in architecture methodologies, standards and tools
  • Understanding of relevant technologies and development life cycles
4

Senior Security Architect Resume Examples & Samples

  • Manages infrastructure vulnerability and compliance monitoring/reporting solutions and organizes related remediation and governance activities tomature infrastructure security policy and technology frameworks and effectively improve infrastructure security posture company-wide. Identifies areas for architectural, engineering and operational improvements of existing infrastructure security solutions, drives such improvements start to finish (M/Q) Creates and maintains documentation of infrastructure security related policies, standards and processes. (D) Utilizes existing infrastructure security solutions and develops new ones to bridge infrastructure security area gaps (D) Develops automation of infrastructure security monitoring and reporting activities (M/Q/A) Provides infrastructure security program transparency to management and compliance by reporting the company’s infrastructure security posture on a regular basis, providing trend data and progress insights. (M/Q/A) Manages the prioritization and remediation activities/projects and collaborates with impacted BUs in remediation (M) Develops and updates infrastructure security program governance criteria and process, and drives adoption company-wide (M) Develops and updates infrastructure security metrics for framework maturity, security posture governance and reporting
  • 5 years in infosec, 4 years primarily in infrastructure security area Passionate about information security Experiences working in a complex business environment, preferred work experiences include large diversified enterprises, service providers, operators, and/or media/entertainment/social networking/gaming business lines Solid understanding of infosec principles and industry best practices in the infrastructure security area In-depth understanding of and hands on engineering experiences on network security architecture, network and networking protocols Hands on security engineering experiences on 3 of the following categories: oUnix/Linux: Red Hat, CentOS, Ubuntu, Solaris, HPUX, AIXoWindows: 2008, 2003, 7oOpen source Web application: Apache, TomcatoDatabase: MySQL, MSSQL, OracleSQLoCisco IOS (routers, switches), PIX firewall, IPS, VPN, ASAoJuniperOS, firewall, IPS, VPNoOther network security, firewall and VPN technologiesoMalware protection technologies In-depth architectural, engineering and operational knowledge and specialties on the following technologies:o Qualyso Sourcefireo Symantec SCSP Solid understanding of attack vectors and hands-on experience with infrastructure security assessment tools, incident response techniques/procedures Moderate exposure and hands-on experiences with threat visualization technologies:o Red Seal o SkyBox Security technology automation and integration experiences Moderate exposure and experiences on cloud/big data security industry best practices Functional programing/scripting experiences using one or two of the following: Perl, Python, PHP, Ruby, Java, C/C++, C#
  • 7-8 years in infosec, 5 years primarily infrastructure security area Infrastructure security-related certifications by ISC2 and GIAC, as well as technology-specific certs by security vendors. List both current and expired certs. Cert expiry is not a key factor in candidate consideration
5

Principal Enterprise Security Architect Resume Examples & Samples

  • Provide cutting edge, creative leadership for next generation of company-wide security architecture, addressing technologies and processes associated with network infrastructure, messaging, operating systems, firewalls, VPNs, intrusion detection, cryptography, and application security
  • Develop security architecture strategies, frameworks and reference models
  • Lead implementation of large-scale security programs
  • Provide security expertise and direction on projects related to security architecture and design, software development, implementation, maintenance, governance, and risk management
  • Collaborate with business unit and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
  • 8 years experience with IT security principles, practices, technologies, programs and procedures, accompanied by an understanding of risk management methodologies and frameworks
  • 5 years demonstrated experience as an Information Security architect
  • Demostrated expertise in enterprise security architecture, including: securing service oriented architecture (SOA); network security; application security; Internet and Intranets; network infrastructure and web services
  • Deep expertise in architecture strategy and implementation and ability to utilize recognized security methodologies (e.g. ITIL, NIST, ISO)
  • Hands-on experience with a diverse range of security technologies that include: multivendor stateful, non-stateful, and application firewalls, HIDS, IDS/IPS, wireless, SSL and IPSEC VPN’s, DLP, SIEM, multifactor authentication, database technologies, encryption technologies, mobility, endpoint and cloud security
  • Extensive technical knowledge in core domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, messaging, collaboration, storage and backups, and related monitoring and management systems
  • CISSP, CISM, SANS or related security certification preferred
6

Enterprise Technology Security Architect Resume Examples & Samples

  • 10 years IT Experience / 7 years IT Security Experience
  • At least 7+ years of security technology and / or compliance experience supporting production system management in a UNIX, Window, or Z/OS technical environment
  • Security certifications or equivalent of CISSP, CCNE, RSA, or GIAC
  • Working knowledge of one or more security and IT Architecture standards including COBIT, TOGAF, Open Security Architecture, or Service Oriented Modeling Framework
  • Demonstrated experience in the following areas: application security, firewalls, intrusion detection & prevention, perimeter appliances, domain segmentation, filtering (virus, spam, etc.), network segmentation, authentication, enterprise portals, portal based access managers, database encryption, data encryption, host intrusion detection, enterprise directories (LDAP and Active Directory), and meta-directories
7

Security Architect Resume Examples & Samples

  • Analyse and understand the different systems and technology present to identify any vulnerability that may jeopardize the security of the infrastructure
  • Understand the current state of how IT is currently being used, what technologies are being used, and how they are secured
  • Document the current state, the desired future state, and any gaps between the two for IS Security
  • Define a list of projects and initiatives to ensure the security of the IS infrastructure is on track towards the desired future state. This transition plan will attempt to close the gap previously identified
  • Define practices, policies, and approaches to detect the weaknesses in the systems and find out ways in which to rectify them
  • Consult on and analyze planned projects to provide guidance on how to improve the security plans for each initiative and related infrastructure implementation
  • Prepare and document security policies to ensure that the employees have written guidelines of appropriate use of corporate systems and data
  • Provide guidance on how to identify/detect any abnormal activity that may occur and may be the reason for a computer invasion
  • Understand and provide expert consultation on security standards and constraints
  • Lead or participate in information security risk assessments and controls selection activities
  • Participate in the Information Security Committee as a Security Advisor
  • Lead suitable information security awareness, training and educational activities
  • Be current on legislation, threats, and vulnerabilities related to security, information security, and privacy and make that information available and consumable by a broad range of business and IT stakeholders
  • Participates as a member of the Information Security Emergency Response Team
  • Possess a thorough knowledge of IT processes, controls, and governance
  • Rules and regulations related to information security and data confidentiality (e.g., SOX, PCI, HIPAA, etc.) and
  • Governance, risk, and compliance frameworks, principles, and applications
  • 10 or more years of IT experience
  • 5 or more years of SAP security experience
  • 5 or more years GRC experience (SAP GRC preferred)
  • 4 years of security/infrastructure protection and/or IS or Information Security audit experience
  • Network fundamentals and design
  • System administration across multiple platforms
  • Enterprise, role-based authorization tools, techniques, design, and best practices
  • Security methodologies, tools, and best practices
  • Risk management practices related to physical, logical, and information security
  • Demonstrated ability to implement security controls that comply with government, corporate, and local regulations
8

Security Architect Resume Examples & Samples

  • Work in partnership with project teams, business partners and vendors to identify technology solutions and strategies to achieve business results
  • Participate in research and development activities, focusing on emerging security technologies and practices with potential benefit
  • Collaborate with application and system architects and developers to design and develop secure solutions across multiple technologies and platforms
  • Provide strategic direction on enterprise security architecture and the implementation of appropriate safeguards and controls
  • Produce architecture deliverables for select assignments
  • Participate in architectural review for specific projects and influence the direction of these architectures to meet enterprise best practices
  • Develop hands on awareness of new trends in security technology and methods and how they should be implemented
  • Document reference architectures and best practices for security technologies and methods being introduced at Nordstrom
  • Provide input into best practices for software development and system administration at Nordstrom
  • Participate in defining architecture strategy and direction for Nordstrom
  • Mentor security engineers, application architects and system architects
  • Bachelor's degree in computer science, engineering or related discipline/experience preferred
  • Minimum of 6 years experience in the securing, development, implementation and maintenance of large-scale systems across multiple platforms Microsoft, Unix and mainframe
  • Development experience with an emphasis on Java
  • 3 years implementation experience with commonly accepted industry standards and best practices relating to security, including COBIT, ISO 17799/13335, ITIL, CMM, NIST publications, ISF Best Practices, etc. Specific experience in driving an enterprise security framework based on these practices a plus
  • SANS, GIAC or comparable certification desired
  • Significant experience on large-scale system delivery projects in multiple development and leadership roles
  • Current experience leading the security architecture effort for a variety of system delivery projects, including enterprise-class systems
  • Broad understanding of IT technologies, including languages, technical architectures, testing methodologies, databases, system design, and modeling
  • Excellent understanding of the Software Development Life Cycle
  • Broad understanding of retail business processes, business applications, data flow and requirements
  • Excellent analytical, problem solving and decision making skills; strong planning and organizing skills
9

Security Architect Resume Examples & Samples

  • Develop a comprehensive understanding of the Nordstrom platforms and strategies in order to improve overall security posture
  • Design, support and problem solve infrastructure security solutions (both technologies and processes)
  • Document and champion security strategies with project teams, business partners and vendors to identify solutions and strategies to achieve business results
  • Practice the fundamentals of security frameworks such as ISO/NIST, and be able to map the standards and policies to solutions and strategies
  • Minimum of 6 years experience in the securing, development, implementation and maintenance of enterprise-level information security systems across multiple platforms
  • 3 years implementation experience with commonly accepted industry standards and best practices relating to security, including COBIT, ISO 27001/27002, NIST RMF, ITIL, CMM etc. Specific experience in driving an enterprise security framework based on these practices is strongly desired
  • Current SANS, GIAC or comparable certification desired
10

Energy & Utilities Security Architect Resume Examples & Samples

  • Candidates must have 5+ years of experience working for a consulting firm or electric utility with experience in compliance, electric operations, or transmission operations
  • Prior knowledge of applicable cyber security standards (NIST, FERC, NERC CIP, etc.) for utility SCADA and Smart Grid applications
  • Experience working in an organization that supports NERC CIP V3 and NERC CIP V5 compliance is highly desirable
  • Certified Information Systems Security Professional (CISSP) certification or equivalent highly desired
  • Candidates must possess proven knowledge and experience with the architecture, engineering and deployment of cyber security solutions
  • Experience in leading and delivering end-to-end solutions, which could include strategy, design, development, testing and training, and implementation
  • Advanced understanding of application, database, and network security principles for risk identification, mitigation, and analysis
11

Security Architect Resume Examples & Samples

  • Conduct and facilitate security reviews including SDLC secure testing requirements throughout the development lifecycle
  • Plan the resolution of any identified vulnerabilities/issues
  • Security review of applications including responsibility for driving requirements definition and risk analysis
  • Participate and lead new projects as needed
12

Software Security Architect Resume Examples & Samples

  • Leading the development effort to ensure security of the core infrastructure without compromising performance, usability and flexibility
  • Fostering a culture of security consciousness across various software infrastructure teams
  • Identifying security design flaws and guiding development teams to address these security issues
  • Develop initial proof of concept implementations of security solutions
  • Perform research in software security and remain at the edge of the field
  • Demonstrated leadership in the application security landscape
  • A track record of building collaborative relationships with stakeholders across many functions
  • Prior software development experience (C, C++, C#, Java on Windows and UNIX)
  • Experience with system-level software, operating system internals, and sandboxing technology
  • Comfort with network protocols at all layers of the OSI model
  • Practical Knowledge of cryptography (SSL certificates, code signing, strong authentication)
  • Experience with browser security internals (rendering engines, Javascript security)
  • Understanding of exploit protection and other advanced attacks containment is desirable
13

Junior Cyber Defense Security Architect Resume Examples & Samples

  • Development of technical security architectures focusing on CIRT/CERT solutions and supporting/related technologies
  • Development of technical security standards focusing on CIRT/CERT solutions and supporting/related technologies
  • Contributing and supporting the technical security strategies for Cyber Defense solution
  • Security incident response and event management solutions (SIEM technology)
  • Log aggregation technologies primarily working with Splunk
  • Security event reporting
  • NetFlow security analysis – StealthWatch or SiLK (for netflow security analysis)
  • Vulnerability and threat management technology solutions
  • Threat intelligence feed integration with SIEM solutions
  • Forensic technology (e.g., EnCase)
  • Incident response methodologies
  • 6+ years of practical experience in the field of IT security is required with 2 years of architecture experience
14

Security Architect Resume Examples & Samples

  • Work with network, platform, engineering and development teams in architecture design and review session
  • Help identify areas of security the firm might want to invest in improve IT security
  • Strong interpersonal skills are critical, since the candidate will working with developers and executives around the world, and must be able to effect change and influence decisions
  • Ability to build consensus across multiple silos
  • Ability to work under high stress and pressure
  • Architecture/Implementation: The ideal candidate will have experience in architecting and implementing enterprise projects that touch all components of the IT stack to fully appreciate level of effort and appropriate roles in IT
  • Languages: The ideal candidate will have experience with several practical languages such as Java, Perl, C/C++, C#, Python
  • Knowledge of the common application and infrastructure level vulnerabilities - ability to explain these risks to developers and senior management
  • Platform: Although this role is not systems administration position, the candidate must have deep knowledge of at least one primary operating system (Unix or Windows), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks
  • Mobile: The candidate will be expected to understand thoroughly the basic architecture of mobile applications, how the Apple iOS works and the common threats that effect any mobile device
  • Network security: The candidate will be expected to understand the standard network model and the risks present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, vpn, and load-balancers, and to understand network architecture
  • The candidate should have expertise with security-related topics such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage etc. Genuine expertise is required here, as the candidate will be extensively tested on security principles
  • In-depth knowledge of network technologies such as SFTP, firewall, DMZ design, IPSec, VPN, Wireless, network topologies and protocols
  • In-depth knowledge of entitlements and access control as well as the various protocols for tracking records such as LDAP
  • Some experience in testing tools, at least one of Fortify, OunceLabs, AppScan, WebInspect, Burp. The successful candidate will be able to explain the ?hows and whys? of the tools, as well as being experienced in using them
15

Security Architect Resume Examples & Samples

  • Identify areas of risk on projects where security requirements cannot bef ully addressed in the required time frame of the project. Document and present those risks to senior business, IT and Security team members
  • Knowledge of the common application and infrastructure level vulnerabilities- ability to explain these risks to developers
  • Some experience in testing tools, at least one of Fortify, OunceLabs,AppScan, Web Inspect, Burp. The successful candidate will be able to explain the hows and whys of the tools, as well as being experienced in using them
16

Security Architect Core, Replacement Resume Examples & Samples

  • Experience and working knowledge of Unix/Linux host operating systems and security capabilities
  • Experience in PKI standards, Digital certificates, Digital Signatures
  • In-depth knowledge of Network Security architecture, models and methodologies, authentication schemes
  • 802 1.x authentication methods and Responding to security related queries
  • Hands on experience with OpenSSL compilation for different operating systems and OpenSSL Secure Socket related api's
  • The Security Architect will work closely with management to identify risks, threats, vulnerabilities and provide remediation guidance
  • Expert knowledge of secure application architectures, encryption technologies, cryptography and key management, authentication and control of application permissions, and implementation of same
  • Build and facilitate Voice-division-wide security architecture practice
  • 12+ years of experience in C/C++ linux embedded software development
  • Good Architecture and Design knowledge
  • Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, SSH, SSL, TLS, HTTP, HTTPS, SIP, RTP) and security capabilities and limitations of each
  • Core experience on Video/Voice over IP, Networking protocols, SIP, RTP
  • Knowledge of different SSL and TLS versions and issues around them
  • Strong fundamentals in networking protocols (TCP/IP), Socket programming,
  • System and Network programming experience on Linux/Android
  • Good problem solving
17

Vulnerability Management Security Architect Resume Examples & Samples

  • Development of technical security architectures focusing on vulnerability management domain related technologies
  • Development of technical security standards focusing on vulnerability management technology and controls
  • Contributing and supporting the technical security strategies for enterprise security
  • Vulnerability management concepts, architecture precepts, and design principles
  • Technical understanding and experience with vulnerability management technology including intrusion detection and prevention systems (IDS/IPS), network vulnerability scanning (techniques and automation), application vulnerability concepts, OWASP top 10, compliance management, patch management, and vulnerability intelligence technology
  • System administration experience – Linux and/or Windows
  • Experience in security controls for Linux and Windows
  • Policy development pertaining to vulnerability and patch management architecture and design
  • Network scanning technologies such as QualysGuard
  • 8+ years of practical experience in the field of IT is required. 4+ years of direct Information Security experience
18

Security Architect Resume Examples & Samples

  • 5+ years in information security field or relevant experience
  • Bachelors’ Degree in Computer Sciences or equivalent
  • Security industry certifications, such as CISSP or GIAC, are highly desirable
  • Excellent communication skills, both written and verbal (in English)
  • Ability to find potential security concerns in complex architecture proposals involving multiple layers of applications, interacting data flows and various infrastructures
  • Aptitude to collaborate with a variety of stakeholders, including: IT, Developers, Game Producers, senior management, as well as non-technical teams such as HR or Legal
  • Technical curiosity: passionate drive to learn about new technologies and security techniques
  • Hands-on experience with security technologies, such as VPNs, Firewalls, IDS/IPS, SIEM, PKI, system forensics tools are desirable
  • Programming/scripting experience, such as Powershell, .NET, Python, Perl, PHP is desirable
  • Familiar with complex IT architectures, including production environments with high-availability, high customer base and strong on-line presence
  • Strong knowledge of secure network and application design principles
  • Strong knowledge of security protocols, compliance standards and guidelines
  • Knowledge of risk management and risk assessment methodologies (STRIDE, NIST)
  • Knowledge of web application security (OWASP), encryption, software security and coding best practices are desirable
19

Senior Security Architect Resume Examples & Samples

  • Information Security Consultancy
  • Interpreting and applying appropriate Standards, Policies and Legislation, e.g. ISO27001, PCI DSS, COBIT, SOX, DPA, HMG SPF, etc
  • Understanding of Threat and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Security Architectures
20

Software Security Architect Resume Examples & Samples

  • BS or Masters in Computer Science or equivalent desired
  • Exceptional experience and very detailed technical knowledge in at least two of the following areas: security engineering, system and network security, authentication and security protocols, applied cryptography, application security, security vulnerabilities and remediation techniques (e.g. penetration testing, development of exploits)
  • Proven experience architecting and implementing large-scale, enterprise-wide security solutions
  • At least 6 years of application security experience, including threat modeling, threat assessments, risk identification techniques, penetration testing
  • At least 4 years of experience in delivering commercial grade software or services (SaaS, cloud computing, mobile applications or infrastructure), assuming either a development, QA testing, or security role
  • Detailed knowledge of network and Web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols)
  • Substantial experience with both SaaS and mobile applications and infrastructure
  • Substantial experience with the application of threat modeling or other risk identification techniques
  • Ability to move seamlessly between a hacker / attacker mindset and a security engineer / defender mindset
  • Skilled in discussing complex security issues in understandable business terms
  • Experience with enforcing security guidelines and standards with business owners
  • Very detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing
  • Recent development experience with one or more modern programming languages (e.g. Java, Objective-C, C#) required
  • Strong scripting skills (e.g., Perl, Python, Shell script, JavaScript)
  • Expert knowledge of network and web
  • Demonstrated ability to influence across boundaries and at all levels of the organization
  • Experience in building or implementing security solutions (e.g. risk management, data analytics)
  • Experience in mentoring engineers and architects
21

Security Architect Secure Works Resume Examples & Samples

  • Design and architecture for Information Security technologies and processes (e.g., firewalls, IDS / IPS, SIEM, Anti-Virus, etc.)
  • Review and approval of substantive security control changes, including firewall rules, VPN configuration changes and third-party connectivity
  • Providing as-built design documentation and control methodology for all systems, to include lifecycle management of these documents
  • Transition of knowledge to support teams for all newly designed, or substantively redesigned, Information Security technologies
  • Act as a level 3 escalation point for Information Security issues from any support team, including the security operations team. This will include the need for 24x7 availability from the lower level support teams, but there will be no direct call-outs from an end user or general on-call status
  • Upon request, author articles and blog posts for the Director of Information Security’s review, suitable for use in internal purposes as part of an ongoing security awareness program. This may include brief video interviews for the intranet, responses to current events in the world, or active threats in the high-tech and related industries that may be of interest to the community, and other topics as assigned
  • Other services as requested by the Director of Information Security, or Chief Information Officer
22

Security Architect Secure Works Resume Examples & Samples

  • This position requires 50-60% of travel*
  • Build and execute programs to help customers determine and assess security requirements by
  • Experience leading large multi-disciplinary sales pursuit and/or customer engagement teams in a
23

Senior Security Architect Resume Examples & Samples

  • Help align and further develop the Security Architecture roadmap that integrates and aggregates all of the solutions for business applications and technology infrastructure
  • Lead the development of the Enterprise Security Architecture strategy/blueprint and Reference Architectures
  • Provide highly specialized Architectural consulting around Security across numerous initiatives and lines of businesses
  • Provide architectural support around the implementation of Information Security initiatives and projects
  • Lead and/or influence the solution architects in the development of the solution architecture
  • Consult on integration and conversion activities. Recommend technologies to facilitate service integration
  • Initiate activities to optimize or enhance enterprise services architecture offerings
  • Participate in technology evaluations and assessments
  • Enterprise Architecture Background; preferably in the financial or regulatory sector
  • Expertise around implementing security best practices and assessments
  • Knowledge of integration and architecture practices focusing on Security technologies
  • Excellent presentation skills with the ability to present to technical, management and business stakeholders
  • Ability to encourage, motivate and guide individuals and teams around security requirements and integration capabilities
  • IT Architecture and knowledge of concepts, philosophies and tools behind the design of applications, information and underlying information technologies
  • Be familiar with delivering architecture artifacts such as: Solution architectures, Blueprints, Roadmaps and Vendor Evaluation/ RFP's
  • Knowledge of architecture in the following domains
  • Familiar with TOGAF and/or Zachman frameworks and methodologies
  • SOA Architecture and Security certification considered an asset
24

Senior Security Architect Resume Examples & Samples

  • Must be able to communicate with leaders, teams and technical personnel on a continuous basis
  • Expert knowledge of the practical security application of engineering science and technology
  • Ability to apply standard security principles, theories, concepts and techniques
  • Ability to communicate experience and knowledge to provide direction and guidance to a broad base of development and architecture teams across TWC
  • Must learn about all security vendors, trends and industry
  • Must subscribe to news services to stay current on security trends, issues and industry changes
  • Must seek out vendors and participate with beta testing new products and recommending changes to existing products
  • Must make product recommendations to vendors to support the needs to TWC
  • Have an understanding of the vendor pricing models for most security applications being utilized by TWC
  • Strives to implement the best of breed solution, to complement both TWC and the team
  • Is driven to meet and exceeds the performance goals for both the team and the department
  • Contributes and shows commitment to the success of the department and group
  • Not afraid to step up when the need arises, works for and with the team or other business groups to accomplish what is needed
  • Develops collaborative teams across the enterprise to innovate and create new solutions
  • Must have a broad understand of technology in all areas and a detailed knowledge of all Security platforms, applications or solutions available in the market
  • Develop frameworks and concepts to be used as roadmaps for the business, gap analysis, metrics, reporting and for management to visualize concepts to make a business decisions
  • Be able to work in conjunction and collaborate with project teams from all over the company, understanding their scope and business needs when providing security recommendations or solution options
  • Excellent communication skills are a must
  • Be able to work under pressure with tight deadlines
  • Must be able to efficiently translate project architecture/environment diagrams to formulate appropriate questions to identify security gaps in the solution architecture
  • Must be able to provide recommendations to mitigate problems in a time efficient manner
  • Must gain an understanding of internal TWC policy and compliance
  • Must be able to conduct targeted research on business solutions and best practices to address daily assessments
  • Conduct training, presentations and forums to promote security awareness and practices throughout the business
  • Know what's right and does what is required in the face of adversity
  • Be the voice of clarity in the mist of confusion and chaos
  • Be the voice of reason and understanding of all sides with inclusive values of TWC in each decision
  • Be an advocate of doing the right things right, the first time
  • Values and solicits ideas and opinions from others
  • Acts to promote positive climate, good morale and cooperation with the team
  • Develops and instills a collaborative team environment
  • Builds and seeks out diverse team members to add to the team
  • Participate in a leadership role in a security and other professional organizations that impact the community at large and represent TWC's core values
  • Create security tools, concepts, process, or papers that may be leveraged by the community at large
  • Attend vendor conferences on a periodic basis to develop an understanding of the research and development roadmap for various applications or vendors
  • 5 - 10 years of experience, Specialized training or four (4) years additional experience may substitute for a degree
  • Hold two or more Security Certifications, such as a CISSP and CISM Work experience may be used in replacement for this requirement
  • Must possess a business background and be able to translate technical security concepts into business terms for management
  • Participate in Professional Security Organizations on a regular basis
  • Staff accountability typically includes mentoring junior to mid-level
  • Continuing education in the security field is required
  • Bachelor's degree preferred in Computer Science, Engineering or IT related field
25

Security Architect Resume Examples & Samples

  • Minimum of 5 total years of information technology experience
  • At least 1 - 2 years as a technology architect or Java application developer or technology analyst
  • At least 2 years experience in an IT Risk organization or equivalent experience in risk and security processes with experience in the following areas – Threat Modeling, Application Security Controls (e.g .OWASP Top (10), Authentication and Authorization, and Vulnerability Management, SDLC methodologies (AGILE, Waterfall),
  • Broad knowledge of various technology products and infrastructure services. Experience with Java, n-Tier technologies, enterprise databases, Mobile technology (wireless, IOS, Android, Blackberry), UNIX and Windows Server and Desktop OS, Web/Middleware (Apache, Tomcat, IIS, JMS/MQ), and (1) or more of the following languages:.NET, #C, C/C++ programming, and Virtualization technology, Network (Firewall, Load Balancing, Web Application Firewalls, Accelerators), Source Code Analysis and Review
  • Strong written and oral communication skills, including guiding difficult conversations
  • Strong organizational skills and the ability to coordinate multiple parallel work streams
  • Knowledge of Project & Program Reporting principles
  • Knowledge of SDLC, project and program KPIs, accompanied by strong analysis skills for generation of project metrics
26

IT Security Architect Resume Examples & Samples

  • Designing large or complex projects, including system and application designs, software and technical architecture, in accordance with strategies and objectives
  • Discussing feasibility of different design proposals and trade-offs made, their relative strengths, risks, implied costs, 'fitness for purpose', etc. with ADAs, peers, PMs, and designers
  • Liaising with stakeholders and analyzing business requirements and processes
  • Defining the structure of an application system within the constraints of the requirements
27

Security Architect Secure Technology Architecture & Management Resume Examples & Samples

  • Develop security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments
  • Assess and develop strategic plans for enterprise security tools and services
  • Assess current and planned applications and systems, identifying security architecture issues and designing solutions for gaps
  • Collaborate with application and system architects to design and develop secure solutions across multiple technologies and platforms
  • Demonstrate passion towards Information Security while cultivating company wide security awareness
  • Influence business partners and application teams on security best practices
  • Minimum of 4 years experience as a security architect or senior engineer or developer focusing on security working on substantial projects
  • Current experience leading the security architecture effort for a variety of enterprise-class information security policies, practices, systems and capabilities
  • Proven ability to collaboratively plan, document, and present security strategies, achieve buy-in from IT leadership and manage the strategy implementation process
  • Broad understanding of IT and Information Security technologies, including technical architectures, testing methodologies, system design, and modeling
28

IT Security Architect Resume Examples & Samples

  • Communicate with stakeholders and analyses business requirements and processes
  • Defining the service model and interface to UBS environment, including the operating model and high level process landscape
  • Coaching colleagues in more junior roles
29

Security Architect Resume Examples & Samples

  • Familiarity with Cloud Computing and Software as a Service
  • Background in building secure software code in a Microsoft environment
  • Working knowledge of C# and .Net security implementations
  • Knowledge of claims based authentication, SSL Certificates, Web related vulnerabilities, and federation is a big plus but not required
30

IT Security Architect Resume Examples & Samples

  • Stay abreast of new technologies
  • Consult with application teams on security requirements and best practices
  • Extensive IT security experience including strategic guidance for improving IT consumer security experience, broad knowledge of current security technology solutions, and the ability to observe and detect "rethinking routine" and "simplification" opportunities
  • Strong interpersonal communication skills (verbal and written) and strong emotional intelligence. Ability to talk with average every day users (CSR, physicians, business, etc.), managers, and senior leaders to gain a clear sense of their security user experience
  • Strong analytical skills (collaborate with technical architects and policy SME to resolve underlying issues)
  • Understands principles of information security at broad and high levels
  • Prior Healthcare solutions experience
31

IT Security Architect Resume Examples & Samples

  • Adaptive and provides an appropriate level of controls around our core assets
  • Integrated into the business
  • Addresses risk sensibly and pragmatically
  • Producing, evolving and refining the security architecture for Burberry
  • Establishing a target solution architecture and roadmap, developing this as the business evolves
  • Driving the overall technical and product strategy for the current and any future states of the roadmap
  • Help to define and agree security principles as they relate to the security architecture
  • Raise and resolve any architectural issues/risks that could have implications against the security model
  • Engaging and directing any ‘Proof of Concept’ or prototyping of applications and solutions
  • Ensuring that delivery projects plan for all required security governance, reviews, sign-offs and checkpoints
  • Engaging and working with suppliers and partners in order to define the best possible solution and the most appropriate deployment of their technology and products
  • Identifying and exploiting the re-use of any components, patterns or techniques and documenting these for re-use by delivery projects
  • Provide governance during project build and test phases to ensure compliance with and appropriateness of the security architecture
  • Ensure that operational and supportability guidelines are factored into the construction of any solution - this will include liaison with the relevant live service and service management teams to ensure that they understand the implications of the design
32

Security Architect Resume Examples & Samples

  • Coordinate project security in order to assist IT teams in delivering secure infrastructure solutions with his security recommendations and requirements
  • Act as a key technical resource for Ubisoft internal clients, including top management, regarding security matters related to all environments
  • Ensure prevention and good management of technical, legal and human security-related risks by elaborating and proposing improvements to security policies, guidelines and standards with a global mindset, taking into consideration all Ubisoft offices
  • Perform and participate in technical vulnerability assessments of systems currently in place in addition to security evaluations
  • Implement or deploy new tools, processes and best-practices in order to improve knowledge sharing and to raise security level while promoting security awareness among Ubisoft employees
  • Communicate with efficiency while delivering security needs and validating that appropriate security measures are in place
  • Carry out all other related task
  • 5+ years in technical hands-on on at least one of the following topics: Microsoft security, Network security, Linux security
  • Experience delivering risk assessments for infrastructure deployments in a AAA game environment
  • Strong experience of key concepts: TCP/IP stack, VPNs, Firewalls, PKIs and encryption
  • Programming/scripting experience (Powershell, ASP, .NET, Python, Perl)
  • Effectively collaborate with a variety of stakeholders from top management to technical teams
  • Proactive and result-oriented
  • Autodidact and rigorous
  • Solid knowledge of industry standards (ISO27002, PCI Compliance, NIST/DISA)
  • Advanced knowledge of Application Security Architectures and Guidance
  • Experience in recruiting and selecting
  • Capacity to analyze risk and make contingency plans
  • Be creative and innovative
  • Be proactive, dynamic and diplomat
  • Result-oriented and work under-pressure
33

Senior Security Architect Resume Examples & Samples

  • Expertise in data-protection mechanisms including an in understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA etc
  • Knowledge and experience with key management protocols such as KMIP and techniques of effective key management and industry standard guidelines from X9, NIST etc
  • Expertise in data-protection software and hardware solutions including Application, Database, and File level encryption and tokenization solutions
  • Manage the life cycle of all security technologies
  • Creation and maintenance of enterprise security standards applicable to all technologies in the portfolio
  • Provides leadership to extend the organization s ability to optimize use of emerging technologies
  • Participates in setting strategic direction
  • Maintains an expert knowledge in the field of Information Security and the related issues, systems, processes, products, and services
  • Advises leadership on Information Security issues, systems, processes, products, and services
  • Maintains oversight of the design and implementation of IT systems to ensure appropriate and effective security controls are included
  • Years of Experience: 10 or higher​
  • Deep technical understanding of and experience with security technologies including, but not limited to, intrusion detection/prevention, event correlation, firewall, antivirus, anti spam, policy enforcement, patch/configuration management, audit, secure application development, etc
  • Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS SQL Server Microsoft Outlook, J2EE and .NET applications, etc
  • Familiarity with hosted and cloud services, especially Seas and Iasi services, and the related security implications and control approaches
  • Ability to use personal influence and communications to align technology to business objectives
  • Self motivated without the need for signification management oversight
34

Security Architect Resume Examples & Samples

  • Owns the end to end security solution design process
  • Technical feasibility and content of the solution mapped to the customer requirements
  • Utilizes standard solution design process and Global assets
  • Develops work breakdown structure and supporting staffing model mix
  • Defines and facilitates approval of source of labor delivering on the deal
  • Identifies all costs in solutions, looks for gaps and develops mitigation strategies to insure project will be delivered to cost case as solutioned and meets customer needs
  • Updates required changes throughout the QA processes
  • Participates in client meetings to articulate technical benefits of solution, address technical issues and objections
  • Assists in technical, pricing, QA, and/or solution assurance reviews
  • Manages, coordinates, designs and/or leads proof of concept/technology efforts for standard service products including benchmarking
  • Works with PM and Opportunity Owner to assure successful Delivery Transition Review (DTR)
  • At least 4 years experience in Analyze and advise Client IT Architecture requirements
  • At least 4 years experience in Architect role
  • At least 4 years experience in Communications-written and verbal
35

Security Architect Resume Examples & Samples

  • Development and support of technical security architecture focusing on network security design
  • Development of technical security standards and strategies focusing on network security related technology and controls
  • Ability to understand and interpret network security strategies and direction
  • Collaborate with the business to understand and influence business requirements
  • Ensure alignment with enterprise technology standards and interpret network security strategies and direction to create new and innovative security architecture solutions that drive changes for internal and external business partners
  • Maintain knowledge of current and emerging technologies/products/trends related to architectural solutions through research and training
  • Assume a lead role as a trusted advisor and mentor for internal security operations team
  • Responsible for identifying, analyzing, and driving complex problems to resolution as they pertain to security infrastructure; Firewalls, Load Balancers & Remote Access systems
  • Develop and document reference architectures and associated standards to be used as a basis for technology selection and implementation
  • Develop roadmaps that define the future state security architecture and recommend the selection of hardware and software products and when work will be done to evolve to this future state
  • Participate on application and infrastructure implementation projects to insure the design conforms to security architecture standards, and modify or extend the technical security architecture when it is necessary to accommodate project needs
  • Recommends the installation of system upgrades/patches/fixes in support of ESPN’s security infrastructure
  • Accountable for achieving the highest levels of operating efficiencies on assigned tasks and problems
  • Communicates with both internal and external contacts at a variety of organizational levels to diagnose and resolve complex problems
  • You will need to maintain broad and deep technical skills in multiple technical domains such as server, storage, desktop, security, and network infrastructure
  • Spend a significant amount of time in guided exploration of new technologies and solutions that are applicable to the short, medium, and long-term goals of ESPN’s Security Program
  • Help lead in the design and engineering of solutions, including through the development of technical solutions to significant problems
  • Demonstrated technical leadership and ability to transfer knowledge and information effectively
  • A minimum of 8 years of experience in IT, or similar industries
  • Ability to communicate effectively with end-users, business owners, developers, systems engineers and various levels of management
  • Excellent written and verbal interpersonal skills including demonstrated ability to consolidate data to provide easily understandable deliverables
  • Comfortable working in a fast paced, dynamic environment and developing flexible solutions to meet evolving business requirements
  • Ability to successfully manage and execute on multiple projects using project management tools and processes
  • Expert level knowledge of network security concepts and trends
  • Service Management oriented with strong commitment to customer service
  • Demonstrates initiative and the ability to accomplish aggressive architectural project goals when necessary
  • Strong proven technical expertise with technologies and concepts such as next gen firewalling, web application firewalls, network load balancing, remote access solutions, scripting, router, switch and VLAN security, wireless security, security concepts related to DNS, authentication, proxy services, DDOS mitigation technologies, and security analytics
  • Strong working knowledge of network design concepts
  • Excellent documentation skills that can be consumed by engineering teams to implement the designed solution
  • Experience in the Media or Publishing industries
  • Experience with coding and scripting to produce automated tools
  • Advanced understanding of enterprise architecture principles, industry standards and best practices
  • Knowledge of risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies
  • Bachelor’s degree in Computer Science or equivalent experience
36

Security Architect Resume Examples & Samples

  • Perform as the technical lead for designing, engineering and implementing data and VoIP network systems
  • Plan and execute network design and engineering changes / enhancements for improved systems functionality, availability and performance
  • Develop performance and capacity planning
  • Participate in a lead technical role in the development of global standards for the voice and data network
  • Ensure that testing activities are performed and technical criteria are met
  • Perform complex problem resolution working within problem management processes
  • Interface with peers in security organizations and vendor engineering with regard to ensuring that security requirements are met for deployment and ongoing use of the technology
  • Orchestrate technical changes to the global network environment as scheduled through the change management processes
  • Perform detailed technical evaluations of new data and voice network technology and provide technical recommendations for the integration of that technology with other IT systems
  • Provide guidance to other members of the department and other organizations for troubleshooting complex network problems
  • Provide effective network design, architecture & engineering in and across all regions that is responsive, technically competent, and achieves a standards based and reliable service environment that meets business strategies and initiatives
  • Perform at an in-depth level of technical expertise for the analysis, engineering design, and architecture for data and voice network systems in a Cisco based environment
  • Exhibit and perform at a senior level to provide technical leadership to network engineering projects and to perform technical complex problem determination / resolution
  • Provide Tier 3 technical support interfacing with vendor senior level engineers as required
  • Perform complex technical problem determination / resolution for data and voice network engineering and related issues
  • Provide 24X7 support (on a rotational basis) for issues with a high degree of complexity
  • Discover and prevent systematic network errors, issues and problems
  • Provide technical leadership to other members of the team for complex problem resolution and planned changes / upgrades to the environment, to include application of engineering patches and new releases
  • Evaluate new technology to keep the department abreast of developments in network technologies
  • Perform planning, testing and engineering design for the integration of data and voice systems with other technology such as web conferencing and other technical productivity tool sets
  • Perform capacity planning and development of global standards for network engineering
  • Provide a high level of service in terms of solution turnaround and technology advancements
  • Perform detailed technical evaluations of new network technology and provide technical recommendations to management for the integration and deployment of new network technology and systems with other IT systems
  • Develop and oversee development of consistent network architecture, engineering, technical engineering and operations procedures, and well defined and documented processes and procedures
  • Develop effective relationships with key IT partners regionally and globally and peer engineers in vendor organizations
  • Bachelor's Degree (8+ years of combined education and work experience in VoIP or Internetworking systems may be substituted for a degree)
  • CCIE in at least one discipline required
  • Minimum 5 years of direct technical data and voice networking experience both hands-on and in a senior technical leadership / technical advisory role designing, architecting and providing in-depth technical support of Cisco based Data Networking and VoIP systems and technologies
  • CCNA and/or CCVP, and CCNP desired
  • Minimum 5 years experience in voice and data networking engineering is desired
  • In-depth technical knowledge of Cisco VoIP and Data Network Internetworking systems
  • Technical expertise and experience with all aspects of network engineering for Cisco Data and Voice network technology, to include systems integration
  • Familiarity with Linux and Windows server environments, as related to the deployment, technical design and identifying requirements for technical integration and maintenance of Voice and Data Network systems at a CCIE level
  • Must exhibit the ability to provide technical leadership on network engineering projects with regard to cross- technology disciplines: data, voice, video networking and web based technologies
  • Ability to form and sustain key working relationships across the technical community within the company regionally and globally
  • Exhibit the ability to explain complex technology to non-technical business constituents
  • Ability to lead portions of network engineering projects to successful completion
  • Advanced knowledge in one more areas a plus: Cisco LAN/WAN/WLAN, VoIP, Unified Communication and upcoming advanced technologies
  • Knowledge of network infrastructure must include Layer 3 switches, traditional routers, and content switching equipment
  • Knowledge and skills necessary to select, connect, configure, and troubleshoot various networking devices capabilities: Extending Switched Networks with VLANS, IP Routing, Managing IP traffic with Access Lists, and establishing Point-to-Point connections
  • Ability to document the current technical environment network topology and keep up-to-date diagrams
  • Strong presentation skills, both oral and written
  • Ability to be flexible and take initiative in a fast paced work environment
  • Strong interpersonal skills with the ability to interface effectively with a variety of functions at all levels within the organization
  • Strong planning and organization skills
  • Ability to obtain sponsorship and to prioritize multiple projects
  • Ability to anticipate technological changes, communicate the impact these changes may have on the organization and meet the business requirements necessary to implement the changes
  • Familiarity with Internet enterprise and related web applications
  • Direct experience and expertise with multiple network protocols and technology including WAN, LAN, WLAN, MPLS, VPN, ATM, Frame, Ethernet, Network Acceleration / Compression Devices, DNS, DHCP, Network Routing (BGP, IBGP, EIGRP, GRE tunnels, etc), ACS / Tacacs, Voip, Load Balancers and Network Management tools
  • Ability to lead and complete tasks independently with attention to detail in a high volume environment
  • Excellent network systems documentation and architecture diagram skills
  • Familiarity with project management methodologies
  • Consulting skills, business acumen, and the ability to translate complex technical network engineering requirements into business concepts
37

Security Architect Resume Examples & Samples

  • 8+ years experience in technical design and architecture roles
  • 5+ years security experience in large enterprises, preferably in global financial services
  • Experience in security related to cloud-based technologies, especially Amazon AWS and MS Azure
  • Demonstrates a sound understanding of vendor technologies and roadmaps, and remains current with key IT industry themes and emerging trends
  • Demonstrates ability to build and maintain collaborative and trustful relationships with a variety of stakeholders
  • Experience with security of applications
  • Experience with NIST and Open Security Architecture frameworks
38

Security Architect Resume Examples & Samples

  • Depth of knowledge in core security domains: Security Operations, SIEM, Security Intelligence
  • Experience in the design and deployment of technology and solutions in the core domains: Security Intelligence / SIEM
  • Product knowledge of SIEM : Qradar, ArcSight, …
  • At least 3 years experience in SIEM product knowledge
  • At least 3 years experience in architectural level design in a particular security domain
  • At least 5 years experience in a professional services firm focused on systems integration projects
  • At least 3 years experience in working in projects related to the core domain
39

Security Architect Resume Examples & Samples

  • Participate in technology strategy discussions to understand future technology drivers, assess risk/tools gaps and engage corporate teams to identify and help address potential gaps
  • Support/build community of Application Security Champions across Asset Management
  • Participate in the SDLC process to ensure risk/security controls are being incorporate, and standard frameworks and practices are adopted
  • Develop and monitor the delivery and status reporting of various security metrics and KPI for the Security Architecture Group
  • Support the development of security standards and best practices that will facilitate a consistent security profile across asset management
  • Participate in conversations with tech risk community and respond to specific challenges posed by planned or unplanned changes
  • Knowledge of information security and information risk management principles
  • At least (1) years experience in Information Security, 1+ year as a technology architect or Java application developer or technology analyst a plus
  • At least (1) years experience in an IT Risk organization or equivalent; experience in risk and security processes in the following areas – Threat Modeling, Application Security Controls (e.g . OWASP Top (10)), Authentication and Authorization, and Vulnerability Management, and SDLC methodologies (AGILE, Waterfall)
40

Security Architect Resume Examples & Samples

  • Understand corporate strategic plans and fundamental business activities of the NFL and its member Clubs. Maintain current knowledge of applicable cyber threats, regulatory and compliance issues related to information security. Based on this knowledge, develop, maintain and oversee an enterprise-wide Information Security Architecture Framework that is aligned with the NFL’s business strategy
  • Design and implement a roadmap that clearly shows key milestones to develop a sustainable, effective Information Security Tools & Services catalog to be utilized by the enterprise as a whole
  • Provide technical expertise and direction in risk assessment and risk management activities across the enterprise. Participate in Risk assessments for league, member Clubs, and 3rd party vendors. As applicable, maintain risk register, and provide guidance with the development of risk treatment plans
  • Provide subject matter expertise to executive management on a broad range of information security and risk best practices impacting the Sports and Entertainment industry
  • Collaborate with project teams and other system architects/Engineers to develop system designs and project plans that include the appropriate security controls and meet security standards
  • Serve as the solutions architect for all Information Security sponsored projects and initiatives
  • Must have a firm grasp of concepts and technology across all IT areas to be able to spot gaps and develop appropriate controls
  • Ability to write both technical and business documents
  • Remain current with industry trends and security threats to advise management on how to mitigate and contain risks to the business
  • Provides strategic and tactical security guidance for all projects and architecture functions, including the evaluation and recommendation of technical controls
  • Conducting, reviewing, and documenting information system security audits and investigations
  • Perform Vendor Risk assessments through on-site visits and reviewing SSAE16 reports
  • Direct the selection, installation, configuration and management of security related hardware and software tools and/or systems designed to support the program
  • Develops, manages and leads the Computer Security Incident Response team
  • Develops and executes testing protocols to validate security practices including, but not limited to, vulnerability/penetration testing
  • Identity Access Management
  • Must have leadership and/or senior team member experience
  • Proven ability to collaborate with technical peers and management
  • Technical and Business writing skills, plus the ability to effectively explain plans and solutions verbally to both IT and non-IT business units
  • Perform in-depth security assessments of both business and IT driven solutions
  • Understanding of emerging technologies in IT such as a Cloud Platforms and Mobile BYOD as well as the associated security risks
  • Ability to conduct vulnerability assessments, analysis and create remediation plans
  • Capable of working independently with minimal supervision
  • Demonstrate a degree of creativity with strong analytical and problem solving skills
  • Bachelor’s degree or equivalent experience and education required
  • 15+ years of experience in IT with 10+ years of experience in the Information Security area
  • CISSP, CISA, or CISM certification required. CISSP strongly preferred
  • CCNA, MCSE
  • Solid understanding of networking - including routing, architecture, and design
  • Solid understanding of Application, Database and Network Vulnerability testing principles
  • Management of security tools such as: McAfee ePO, EnCase, CyberArk, Stealthbits, Resolver GRC, Nessus, Protocol Analyzers, DLP, NAC, SIEM, IPS/IDS, etc
  • Experience in dealing with APTs, DDoS, Targeted and Non-Targeted attacks
  • Proficient in MS Word, Excel, Visio, Access, and Power Point
  • Knowledge of NIST 800-53, COBIT, ISO 27001/02
  • Understanding of current Data Privacy, HIPAA, PCI regulations and implementing processes and/or technology to ensure compliance and data protection
  • Ability to perform Security Audits and Risk Assessments for PCI, HIPAA and Privacy compliance
  • Ability to assess efficacy and recommend improvements to internal processes that may affect architecture, technology standards and/or existing work instructions or procedures
  • Ability to troubleshoot complex system problems and the ability to engage and work with the proper technical areas and vendors to resolve them
  • Ability to coach, develop and lead a technical team while focusing on delivering world-class solutions
  • Able to support a 24/7 on-call function
41

Security Architect Resume Examples & Samples

  • Design and implementation of infrastructure projects
  • Suggestion for change/improvement current client’s infrastructure
  • Analysis of client's requirements
  • Architecture & technical solution design
  • 3+ years of experience in infrastructure design and implementation (at least two projects in leading role)
  • Very Good knowledge of UNIX/Linux (AIX is advantage, Wintel
  • Expert level, LINUX RED HAT, SUSE L5 XEN, VMware virtualization
  • Deep understanding of Banking and Finance Sector and related Infrastructures
  • Overall knowledge of datacenter infrastructure
  • Familiar with complete project life cycle: analysis, design, implementation, testing, support
  • Responsible to provide architecture governance and oversight for the organization
  • Drives the adoption of automation technology, provides architectural supports for Security Services and assists with security issues
  • Independence in solving problems and tasks
  • Communicative English (for internal use)
  • At least 3 years experience in Infrastructure design and implementation knowledge, Unix/Linux, Wintel
  • Master's Degree in Information Technology
  • At least 6 years experience in Infrastructure design and implementation knowledge, Unix/Linux, Wintel
  • English : Fluent
  • At least 3 years experience in Infrastructure design and implementation knowledge
  • At least 3 years experience in Unix/Linux, Wintel
42

Security Architect Resume Examples & Samples

  • Drives definition and implementation of the security architecture standards for Nordstrom
  • Integrates business and security requirements into technology lifecycle management
  • Serve as the security expert in providing solution designs and technical consulting services in support of maintaining compliance with all applicable requirements including internal policy, the PCI-DSS, state privacy laws and ISO 27001 and NIST standards and controls
  • Provide strategic direction for core enterprise infrastructure and Security supported technologies such as data protection (DLP, encryption etc.), perimeter protection, SIEM, managed security services, cloud services security
  • Identify Security application best practices and document vision and strategy and Document security application onboarding best practices and transition strategies
  • Thinks critically about how the organization operates and makes suggestions for improvement
  • Works on complex efforts requiring in-depth analysis and assessment
  • Exercises judgment in selecting appropriate design decisions to achieve results
  • Understands the enterprise wide implications of day-to-day decisions
  • Focuses on sustainable and pragmatic solutions
  • Minimum 10 years IT experience and 5 years IT security experience required
  • Implementation experience with commonly accepted frameworks such as ISO 27001/27002, NIST, CMM etc
  • Demonstrated experience in the following areas: intrusion detection & prevention, perimeter security (on prem and services-based), network segmentation, database encryption, data protection, threat monitoring, cloud security services, enterprise directories (LDAP and Active Directory) required
  • Demonstrated knowledge of threat modeling and application security risks and mitigations (e.g. OWASP), knowledge of Web Services standards as they relate to an enterprise security model required
  • Industry certification in security (e.g. CISA, CISSP, and/or GIAC) encouraged
43

Security Architect NY AVP Resume Examples & Samples

  • Take ownership of at least two security architecture areas. Initially obtain an in-depth knowledge of all aspects of the area and then further develop and manage the area. Areas include topics like Application and Mobile Security, Identity and access management, Authentication, Cloud Security, Cybersecurity
  • Provide security consultancy to key projects of the bank. Participate in project reviews
  • Create partnerships with key stakeholders, in particular with the Application Development departments, Infrastructure product and engineering teams, IT Risk
  • Present security topics at internal events
44

IT Security Architect Resume Examples & Samples

  • Adaptive and meets the appropriate level of controls around our core assets
  • Engaging and working with suppliers and partners in order to define the best possible solution and appropriate deployment of their technology and products
  • Identifying and exploiting the re-use of any components, patterns or techniques and documenting these
  • Provide governance during project build and test phases to ensure compliance with the security architecture
  • Ensure that operational and supportability guidelines are factored into the construction of solutions - this will include liaison with the relevant live service and service management teams to ensure that they understand the implications of the design
45

Technical Security Architect Resume Examples & Samples

  • Identifying the current state and defining the strategic target state of a global anti-virus, anti-malware solution, whilst remaining within policy guidelines, security objectives and CTO standards
  • Producing detailed documentation of all architected solutions and their component parts
  • Discussing feasibility of different design proposals and trade-offs made, their relative strengths, weaknesses, risks, implied costs, 'fitness for purpose', re-use, etc. with ADAs, peers, PMs, and SME’s
  • Communicating with stakeholders and analysing business requirements and processes; make recommendations, and leads in shaping future plans
  • Defining the service model and interfacing to UBS’ environment, including the operating model and high level process landscape
  • Ensuring documentation of process, solution and service design on a project level
46

Security Architect Resume Examples & Samples

  • Provide secure development guidance (education, awareness, processes and tooling) to colleagues within your department and across IBM
  • Develop and manage relationships with internal and external auditors according to your department’s requirements and IBM policies
  • Stay current with security trends, regulations, and Industry standards/certifications and contribute to a roadmap to enhance the security of our offerings
  • Participate in Security Assessments of networks, systems and applications
  • Liaise with customers and define testing requirements and parameters, documenting an effort estimation, terms of engagement and final report
  • 2+ years commercial experience
  • At least 10 years experience in Commercial Experience
  • At least 10 years experience in Architect Solution for Security
47

Security Architect Resume Examples & Samples

  • Work closely with enterprise architects, other functional area architects, engineering, and security specialists to ensure adequate security controls are in place for the ERP deployment
  • Define and address Data Privacy regulations from multiple jurisdictions
  • Ensure the ERP deployment meets business objectives and regulatory requirements
  • Assess and understand Pearson’s current security posture and future architecture, and align recommendations accordingly
  • Develop any business, information, and technical artefacts that are part of the enterprise information security architecture as required to support the ERP deployment
  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping the ERP project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Analyse business impact and exposure, based on emerging security threats, vulnerabilities and risks
  • Design security configuration guideline for information technology devices and systems, as well as mechanisms for assessing compliance with the guidelines
  • Design and build controls to address security risks and events as identified
  • Embrace a culture of continuous service improvement and service excellence
  • Stay up to date on security industry trends within the industry
  • Experience in the Information Security space
  • Experience with the deployment or security assessment of a Global ERP solution
  • Experience of integrating with Oracle ERP would be an advantage
  • Experience assessing the risk of leveraging SaaS business-critical applications
  • Experience with multiple Data Privacy regulations
  • Formal training in and experience using an enterprise architecture methodology (for example, the Zachman Framework or TOGAF)
  • Strong experience with security technologies, including NextGen Firewalls, DLP, web filtering, NAC, IDS/ IPS, IdAM, Certificate Management, SIEM, Endpoint Protection, Anti-malware, vulnerability management
  • Experience with applicable information technology devices and systems, per specialty
  • Well-rounded background in host, network, database, and application security
  • Experience driving security awareness
  • Professional IT Accreditations (C ISM, CCSA, CCSE, JNCIA, CCNA, C ISSP, CompTIA Security)
48

Security Architect Resume Examples & Samples

  • Native database protection solutions
  • Strong experience in Threat Modeling of complex security systems
  • Experience in delivering comprehensive architecture specifications for complex security​
  • Evaluates and assess risk as part of the life-cycle analysis
  • Assists in the evaluation of overall risk for IT systems and the data they contain and process, accounting for the people, processes, and technologies that provide security controls
  • Years of Experience: 3-7​
  • Executive presence; highly effective communicator; well honed influencing and negotiating skills
  • Leading and/or participation in teams
49

Security Architect Resume Examples & Samples

  • Macro and Micro Design of the solution
  • Implementation Manual (essential for ongoing support)
  • Project Plan outline (in close cooperation with the Project Manager)
  • Firewall Rules design, including detailed analysis of data flows
  • Change Records
  • At least 1 year experience in deployment of security or systems management infrastructure
  • At least 1 year experience in analysing data flows and define necessary firewall rules
  • At least 1 year experience in planning and delivering changes into a production IT environment
50

IT Security Architect Resume Examples & Samples

  • Establishing a target solution architecture and roadmap, developing this as business evolves
  • Helping to define and agree security principles as they relate to the security architecture
  • Engaging risk management functions to ensure that any exceptions are appropriately managed
  • Providing guidance for the implementation of security services and solutions
  • Burberry is an Equal Opportunities Employer and as such, treats all applications equally and recruits purely on the basis of skills and experience
51

Senior Security Architect Resume Examples & Samples

  • Develop an Information Security Architecture roadmap and 3-year plan for BCE
  • Focus on Information Security standards and technology architecture
  • Develop and deliver Executive presentations
  • Lead BCE wide discussions on architecture
  • Develop technical requirements for securing technology, applications, and networks
  • Develop a BCE wide communication plan
  • Build content for security requirements for RFPs
  • Work with Telecomm industry groups on Global standards
  • Work with strategic BCE technology partners to influence roadmaps
  • Oversee and provide support to network engineers and IT architects across BCE
  • Minimum of 5 years Information Security, minimum of 5 years IT or Networking and minimum of 3 years Architecture
  • Critical thinker with strong problem-solving skills
  • Knowledge of ISO 2700x, ITIL, TOGAFCl, and PCI-DSS
  • Experience designing solutions for Authentication, Encryption, GRC, Event correlation, Identity management, and Access management
  • Degree in business administration and a technology-related field, or equivalent work- or education-related experience
  • High level of personal integrity, and the ability to professionally handle confidential matters and demonstrate a high level of judgment and maturity
  • Bilingual preferred, but not mandatory
  • Professional security management certification, such as a Certified Information Systems Security Professional (CISSP) or other similar credentials
  • TOGAF 9 certification
  • Experience in the fields of business continuity planning, auditing, and risk management
52

Senior Security Architect Resume Examples & Samples

  • Sit on the Architecture Review Board to serve as Security’s voice in the governance of the System / Software Development Process (SDLC), as it relates to architectural elements
  • Assist IT Risk with security consulting, as needed, as it relates to the technology components involved in the assessment
  • Lead proof of concept efforts for the security teams
  • Lead the design effort for security solutions and champion them through the architectural portions of the SDLC process
  • Provide input into vision for the future of security solutions
  • Minimum 6 years of overall information technology experience
  • Minimum 3 years IT security/IT architecture experience
  • Knowledge of various networking concepts and devices (e.g., routing, switching, VLANs, etc.)
  • Knowledge of various databases (e.g., Oracle, MS-SQL, etc.)
  • Knowledge of emerging technologies (e.g., mobile, cloud, etc.)
  • Knowledge of various architecture frameworks (e.g., TOGAF, etc.)
53

Security Architect Resume Examples & Samples

  • Depth of knowledge in one or more of the Security Intelligence / SIEM
  • An understanding across multiple security domains such as Identify and Access Management; Application and Data security; Infrastructure and Endpoint; as well as the inter-relationships between major components
  • At least 5 years experience in architectural level design in Security Intelligence / Security Information and Event Management (SIEM)
  • Basic knowledge in and experience working across diverse teams to facilitate solutions
  • Basic knowledge in and experience working with Security practitioners
54

Security Architect Resume Examples & Samples

  • Generates high quality artifacts such as architectural and capabilities roadmaps, requirements, high level and detailed designs and deployment plans
  • Works with cross-functional teams, support the assessment and implementation of new security technologies, their viability, and related risks, and create initial points of view followed by recommendations on how they should be leveraged to enable and protect the environment
  • Provides security controls, processes and technical advisory support to business units and projects by working cross-functionally to develop and implement strategies that balance security recommendations with business needs
  • Acts as SME and provide support and analysis during and after security events as needed
  • Supports Security Solutions Officers as needed with recommendation on systems development/business requirements, information security functional requirements, security solution options and implementation plans
55

Security Architect Resume Examples & Samples

  • Depth of knowledge in one or more of the core security domains: GRC, IAM, Security Operations, SIEM, Application, Data or Infrastructure, Mobile Security
  • Solid understanding and experience working a structured solution design methodology The successful consultant will be internal advisor to other IBM consultants and client teams. The consultant will assist in pre-sales, sales, closure, and then organizing the delivery of security consulting services with local teams
  • Experience working across diverse teams to facilitate solutions
  • Readiness for customer related travel 35% inside Benelux
  • Experience in working international deployment roles
  • At least 5 years’ experience in working within a particular security domain
  • CISPP, CISM certification
56

Security Architect Resume Examples & Samples

  • Ability to speak to the security landscape, architectural models and solutions credibly to peers and to senior leaders
  • In depth knowledge and experience in the following security domains: Identity and Access Management; Application and Data Security; Infrastructure and Endpoint; Security Intelligence / Security Information and Event Management and Cloud based Services
  • Experience in the design and deployment of technology and solutions in Identity and Access Management including governance, authentication and credentialing models; including cloud based identity services
  • Experience in the design and deployment of infrastructure, endpoint, network, security analytics, or other cyber security solutions
57

VP, Security Architect Resume Examples & Samples

  • Serve as a technical security subject matter expert (SME) for the firm
  • Develop security-specific enterprise reference artifacts (e.g., patterns, blueprints, roadmaps, etc.)
  • Perform security consulting on projects implementing or modifying technology, as needed, providing direction and guidance on related security technologies and controls
  • Participate in the selection decisions of security tools for use by various teams
  • Provide input into vision and roadmap for the Information Security department and the role of security solutions
58

Security Architect NY AVP Resume Examples & Samples

  • Provide security consultancy to key projects in the bank, representing Security Architecture in such engagements
  • Participate in project reviews and provide security recommendations and mandates
  • Create and maintain partnerships with key stakeholders, in particular with the Application Development departments, Infrastructure Product Management and Engineering teams, IT Architecture, IT Risk and LCD
  • Develop standards, strategies, and implementation roadmaps in areas of security architecture, security services and technologies
  • Define and maintain security solutions (guidelines, blueprints, frameworks) in collaboration with other technical and business stakeholders. Support the rollout of such solutions
  • Present security topics at internal events and to senior management
  • Provide market research and bring new innovative security technologies into Credit Suisse
59

Security Architect Resume Examples & Samples

  • Security tooling and engineering
  • Project and research work as needed
  • OpenStack Security contributions
  • OpenStack
  • Latest security research
  • Security trending for the future
  • Cloud security, especially how it evolves up-stack (towards a SaaS model visible to customers)
  • Virtualization security
  • Fast-paced, results-oriented individual
60

Security Architect Resume Examples & Samples

  • Good understanding of end user services environment ( SIEM platform such as QRadar, Arcsight and Splunk, DLP, Email Security, Guardium, Malware and other end point security products)
  • Good knowledge of Mobile device management platforms e.g. Airwatch, Maas360 Fiberlink, Blackberry, Tangoe
  • Working knowledge of Virtualization (Cirtix: XenMobile, Xen Desktop, Xenapp, VMWare)
  • Must have sound knowledge of FTE estimation and staffing methodologies
  • Basic knowledge of solution design workflow
  • Good understanding of deal life cycle
  • Fundamental knowledge of transition and transformation methodologies, is preferred
  • Good oral and written communication skills along with excellent presentation skills
61

Security Architect Resume Examples & Samples

  • IBM Infosphere Guardium (DAM)
  • IBM Tivoli Identity Manager, IBM Tivoli Access Manager (IAM)
  • HP ArcSight (SIEM)
  • MS AD, Sun LDAP (Directory Servers)
  • SmartMessage, Symantec Messaging Gateway (SMTP Gateway)
62

Senior Software Security Architect Resume Examples & Samples

  • Liaises with various partners within project teams to define security requirements, track security specific issues/concerns, provides security solutions, communicates identified vulnerabilities (newly introduced to or perpetuated within the environment) and identifies departures from security policy
  • Manages internal information security projects that require little assistance from other groups including: writing requirements, managing the procurement process, initial installation and configuration and overseeing the entire project lifecycle
  • Researches, evaluates, and remains current on relevant and emerging tools, techniques and technologies within the IT and security space
  • Anticipates and recommends security related upgrades, enhancements and development of business systems applications
  • Bachelor's Degree required
  • ISSP - Certified Information Systems Security Professional OR GIAC - Glocal Information Assurance Certification preferred
  • Minimum of 12 years of security experience (experience in and understanding of all security domains); minimum of 15+ years of IT experience (server/desktop hardware & software, networking, storage, disaster recovery, backup/restore, etc
  • Ability to design mixed-technology solutions
  • Ability to conduct ROI and gap analysis for potential and existing products
  • Solid problem solving and analytical skills; must be resourceful, creative, innovative, results driven and adaptable
63

Senior Security Architect Resume Examples & Samples

  • Directories (Active Directory, LDAP & X500)
  • Web Access Management (SiteMinder, Oracle Access Manager, ForgeRock, etc.)
  • Single Sign-on and Federation (Kerberos, SAML 2.0, OAuth 2.0, etc.)
  • Device Profiling
  • Windows Security
  • Unix and Linux Security
  • Two-factor Authentication
  • Adaptive Authentication
  • Identity Management (automated provisioning, de-provisioning, certification, etc.)
  • Public and Private Cloud IAM
  • Web Services and API IAM
  • A proven deep architectural understanding of the following is mandatory
  • Web Access Management
  • 10+ years’ experience related to designing, implementing or supporting IAM solutions​
  • Solid written and verbal communication
  • Knowledge of formal architecture documentation processes such as UML, MDA, Zachman, TOGAF
  • Effective at presenting information to different audiences at the correct level of detail (i.e., from engineering teams to executive management)
  • Capable of working on multiple projects simultaneously
  • Capable of defining strategic and tactical solutions, and knowing when each applies
64

Security Architect, Data Protection Resume Examples & Samples

  • Development of technical security architectures focusing on data protection, encryption, and key management solutions
  • Development of technical security standards focusing on data protection, encryption, and key management solutions
  • Contributing and supporting the technical security strategies for encryption and key management
  • Advising on the integration requirements and impact for technologies looking to adopt encryption and key management capabilities
  • Data protection concepts, familiarity with public policy (focusing on US and Europe) regarding encryption and related technology
  • Encryption technology and mathematical concepts – symmetric and asymmetric cryptography
  • Key management concepts, models, and technology
  • Public key infrastructure (PKI) technology - application integration and related concepts
  • Emerging encryption solutions – cloud, mobile
  • Data loss prevention – technology and process definition
  • Prevalent applications with encryption as a function – secure email, database encryption, disk encryption
  • 6+ years of practical experience in the field of IT is required. 3+ years of direct Information Security experience
65

Senior Web Security Architect Resume Examples & Samples

  • Evolve threat landscape of mobile ecosystem for Visa's enterprise
  • Evaluate cutting edge mobile security technologies, drive towards adoption, create proof-of-concept and frameworks
  • Architect and enable enterprise wide mobile security capabilities for Visa's services, solutions and ecosystems
  • Deliver industry leading mobile security standards for Visa's enterprise. Collaborate with cross-functional leads to influence industry standards adopted by Visa's ecosystem
  • Advise leadership on Mobile Security issues, systems, processes, products, and service
  • Degree Required & Years of Experience: B.S + 10/MS + 7 years or higher in Electrical Engineering or Computer Science or relevant field
  • Strong problem solving and analytical skills; able to quickly digest any issue/problem encountered and recommend an appropriate solution
  • Experience in working with SaaS Platform and very understanding of security challenges involve in deploying Cloud Applications
  • Expertise in cryptographic systems running on mobile devices and mobilized services
  • Technical experience with security technologies including, but not limited to, intrusion detection/prevention, event correlation, firewall, antivirus, anti-spam, policy enforcement, patch/configuration management, usage monitoring, audit, secure application development, etc
  • Experience of smartphone platforms (iOS, Android and/or BlackBerry) and mobilized services. Good understanding of embedded systems based is a plus
  • Knowledge in payment services and systems is a plus
66

Security Architect Resume Examples & Samples

  • The Senior Architect is responsible for reviewing technology designs, and designing security controls and solutions, to reduce the risk to Pearson and its customers. They will help define the information security architecture and design for the enterprise. This is an expert/lead technical role
  • Work closely with enterprise architects, other functional area architects, engineering, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Assess and understand Pearson’s current security posture and future architecture, providing recommendations for improvement and risk reduction
  • Develop the business, information, and technical artifacts that constitute the enterprise information security architecture and solutions
  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Contribute to the alignment of security governance with EA governance and project development lifecycle (PDLC)
  • Researches, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors
  • Embrace a culture of continuous service improvement and service excellence; and
  • 7 years in Information Security space
  • Knowledge and experience using SABSA methodology
  • Strong oral, written, and presentation abilities
  • Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential
67

Security Architect Resume Examples & Samples

  • 5 plus years (combined) experience across IT Compliance/audit, Information Security
  • Strong familiarity with governance and controls frameworks, especially COSO and SOX
  • Experience performing audits and vulnerability assessments are a plus
  • Ability to clearly interpret and communicate the threats, risks and impacts to all levels of the organization
  • Experience with regulations, policy, standards, procedures and other requirements and ability to support compliance through process management
  • Direct knowledge of and exposure to SOX & PCI requirements
  • Demonstrated understanding and testing of Infrastructure, Operating Systems, Databases and Application access Controls
68

Payment Security Architect Resume Examples & Samples

  • 5 to 7 years of mobile and payments security experience with a deep understanding of all aspects of mobile security from design, build and integration perspective
  • 7-10 years of Information Security practitioner experience
  • Experience in threat modeling and risk assessments
  • Working knowledge of payments networks and wallet security architectures
  • Strong knowledge of mobile communication and storage protocol/ architectures such as NFC, BLE, Secure Element, Blockchain
  • Strong knowledge of mobile development frameworks such as HTML5, Cordova etc
69

Embedded Software Security Architect Resume Examples & Samples

  • Develop, in conjunction with vehicle and embedded system architects, a comprehensive software security architecture
  • Support on-going security testing and code reviews
  • Ensure security architecture incorporates lessons learned; both internally and externally
  • Maintain technical documentation
  • Understand all requirement sources (customer, vehicle, regulatory, etc.) as inputs for developing vehicle level software architecture
  • High understanding and relevant technical experience with both system and software architecture design
  • Provide technical leadership and decision making to the product software development teams for software systems related matters
  • Supports the selection of appropriate design solutions
  • Considers hardware and software design spaces when developing recommended architectural solutions
  • Define, develop and maintain system security architectural standards companywide
  • Familiarity with Automotive SPICE, CMM, or other software development process model
70

Platform as a Service Security Architect Resume Examples & Samples

  • Leading the security design of the EaaS and PaaS
  • Understanding the group Information Technology (IT) policy, whilst ensuring you build a PaaS which provides a high level of compliance “out of the box” for its hosted workloads
  • Working with policy makers to ensure the policy reflects and supports modern PaaS frameworks
  • Considering design approaches and design solutions for load balancing as a service, firewall automation, access control and identity management within the PaaS
  • Owning the architecture principles around workload segregation at the network operating system and administration layers
  • Being a channel into the security organisation and bringing them into overall process
  • Validating designs with an eye for security design
  • Managing penetration testing for the platform and potentially hosted workloads
  • Overseeing the delivery of relevant design documentation to a high standard and maintaining it for the lifecycle of products
  • Contributing directly to the EaaS PaaS community development through various channels including Deutsche Bank’s internal social media, brown bag sessions and formal communication events
71

Security Architect Resume Examples & Samples

  • Performing Penetration Tests of various attack surfaces such as network, software applications, human (social engineering, trusted insider) and working with business owners to identify remediation strategies for identified issues
  • Identifying technology and control risks within each area
  • Recommending improvements in procedures, processes, operations and systems across Humana
  • Broad IT, IT Security and IT audit experience, preferably in a large corporate environment
  • Master's degree in Information Technology
  • Additional technical certifications of CEH, ECSA, LPT are a plus
  • Previous Security Assurance Architecture experience for a large health care or insurance organization
72

Security Architect Resume Examples & Samples

  • 2) the definition of the security processes for assurance, managementand compliance
  • 3) the definition of security subsystems
  • 4) the design of integration and deployment architectures for security in Networks, Infrastructure, Middleware,Applications and Systems & Service Management systems
  • 5) the collection and validationof requirements
73

Chief Security Architect Resume Examples & Samples

  • Broad and deep background in all aspects of Identity and Access Management, from applied cryptography, to compliance issues and role engineering
  • Deep understand of modern enterprise ecosystems
  • Proven and successful experience in standardization and past contributions IAM related standards
  • ISO 27000 Security certifications a plus
  • Proven experience in enforcing secure coding and independent code reviews practices in development teams
  • A thorough understanding of intellectual property in subcontracting situations
  • The patience to see through ambitious architecture goals
  • The successful candidate must be very comfortable with abstraction and intellectually challenging situations, but with a strong and proven ability to operate pragmatically to derive practical architectures and implementation roadmaps from these abstractions and standards without losing sight of the goals
  • Masters degree in Information Systems, Computer Science or related technical discipline required
  • Demonstrated proficiency in at least one of the following areas: application architecture, solutions architecture, software systems architecture and is comfortable with complex heterogeneous systems
  • Prior experience leading and performing different roles through the SDLC
  • ISO 270001/CISSP certification
  • Outstanding verbal, written, presentation, facilitation, and interaction skills, including ability to effectively communicate architectural issues and concepts to multiple organization levels
  • Demonstrated proficiency in at least one of the following areas: application architecture, solutions architecture, software intensive systems architecture
  • 15+ years of deep technology experience in two or more of the following methodologies and technologies
  • Java, C++, C# languages
  • RDBMS
  • Service Oriented Architecture
  • Enterprise Service Bus (including patterns and adapters)
  • Service Registry
  • Canonical message models
  • Master Data Management
  • Business Process and/or Rules Management
  • Ability to establish rapport with senior executives and to work with stakeholders at multiple levels of the organization
  • Smart card technology experience (Global Platform, EMV…)
74

IAM Security Architect Resume Examples & Samples

  • Performance in multiple areas of FIM, MIM, Active Directory (AD), Exchange, PowerShell, Active Directory Federation Services (ADFS), ABAC, WAP Identity Module, enterprise security hardening,
  • Deliver technical security configuration architecture expertise in implementing cross-organizational information sharing
  • Develop solutions and recommendations for issues caused by process challenges, emerging threats and technology changes
  • Act as trusted security architecture advisor with extensive evidence of ability to provide strategic direction in leading activities in support of Microsoft Identity Management products (FIM / MIM) and enterprise security objectives
  • Provide professional knowledge and experience of information systems security identity policies and large enterprise scale practices
  • Develop security architectures, and engineering system specifications implementing identity management and security controls in development and operational systems
  • Solid understanding application and systems security architecture and best practices
  • SME knowledge of Microsoft Identity Management products (FIM/MIM), and Active Directory
  • Strong knowledge of Exchange and PowerShell, SQL Server, Microsoft SQL Server Integration Services (SSIS)
  • Strong network and host security background in Windows
  • 5+ years’ experience in hands-on Identity Management positions
  • Must have an experience of implementing an enterprise level IAM (ILM) infrastructure
  • Ability to secure solution architecture solutions
  • Ability to effectively communicate and advocate key security requirements and control implementation to the development team
  • Experience in IDM integration across domains
  • Significant experience in ADDS, ADFS
  • Significant experience in other Identity Management Products preferably Oracle Identity Manager (OIM)
  • Significant experience in Oracle DB & Microsoft SQL Server
  • Experience with ABAC, RBAC
  • Security architecture and engineering experience
  • 6+ years of practical experience in the field of IT is required. 4+ years of direct Information Security experience
75

IAM Security Architect Resume Examples & Samples

  • Knowledge of Identity and Access Management (IAM) technologies such as Identity Management platforms, Active Directory, Authentication/Authorization protocols, Provisioning, and Single Sign On technologies
  • Create, maintain and align our Information Security policies and standards with industry best practices and business needs
  • Represent Information Security on organizational project teams and ensure adherence to existing security policies and standards
  • Manage the successful delivery of Information Security projects and services for our customers by working directly with key business stakeholders, executives and project teams
  • Define and drive adoption of our security architecture standards
  • Support the Information Security vendor assessment program
  • Expert knowledge of and experience with Active Directory in large corporate environment (100,000+ users)
  • Strong knowledge of and experience with Microsoft Windows Server systems design, development, maintenance techniques and processes
  • Expert understanding of TCP/IP principles and LAN technology and use of network capture utilities
  • Knowledge of 2 factor authentication methods - RSA Securid, certificate based authentication
  • Understanding of Identity Management systems (MIIS/FIM/OIM) including LDAP services
  • Advanced knowledge of scripting languages (vbscript, powershell, perl, etc.)
  • Excellent customer service and communication (oral / written) skills required
  • Strong critical thinking and analytical skills and ability to think “out of the box” required
  • Must be able to work independently or with a team, under minimum supervision
  • Consults to key customers and senior management on project design and development scope
  • Assists customer organizations with planning and implementing complex configurations
  • Expert level experience in MS Active Directory Domain Services and other Microsoft Directory Services
  • In-depth knowledge of Window Server architecture particularly in a large domain environment managing multi-forest, multi-domain architectures
  • Must have experience with Group Policies and security configuration of Active Directory
  • 2-3 years of software development experience is desirable
  • Must have working knowledge and understanding of networking technologies such as LAN, WAN, TCP/IP, load balancers, firewalls etc
76

Security Architect Resume Examples & Samples

  • Leading and contributing to the security posture of Visa’s networks and systems, data center infrastructures, cloud architectures and solutions
  • Developing, contributing and management of Security Architecture Specifications, Security Architecture Analysis, Threat Modeling, Security Requirements, Security Standards and Design Patterns, Reference Architectures, Security Strategies and Roadmaps
  • Applying security design principles to develop security solutions architectures
  • Providing strategic points of view for security solutions and security industry events
  • Developing and/or carrying out the strategic direction of security projects to enable execution of the information security strategy
  • Developing security solutions to enable execution of the long-term security architecture
  • Driving security technologies evaluations and proof-of-concepts
  • Building strong cross-organizational relationships and effectively influencing staff across the IT organization and product groups
  • Managing lifecycle of security technologies
  • Working closely with the other technology architects to ensure that security is properly embedded in their technology domains architectures
  • Assisting other architects in defining the variance processes and making variance decisions
  • Evaluating and assessing risk as part of lifecycle management
  • Staying current with security technologies and making recommendations for use based on business value
  • Advising leadership on Information Security issues, systems, processes, products, and services
  • Maintaining oversight of the design and implementation of IT systems to ensure appropriate and effective security controls are included
  • Serving as an Information Security expert to contribute to the definition of overall IT architecture
  • 10+ years of information security experience with minimum 5+ years of architecture and design experience in Networks, Data Center Systems, and Cloud Infrastructure and Platforms (IaaS security, PaaS security)
  • Strong experience in threat modeling of complex systems
  • Experience in delivering comprehensive architecture specifications for complex security solutions
  • Experience with creating technical documentation: product documentation, technology and systems/network architecture, and technical whitepapers
  • Strong working experience with the following security technologies: Firewalls, Intrusion Detection/Prevention Systems, Vulnerability Scanning, WAF, Wireless LAN, NAC, DLP, DDoS Mitigation, WAN security, SIEM, Content Filtering, Cloud Security gateways, Secure Proxies, SSL crypto solutions
  • Experience with open source based security technologies
  • Strong knowledge and working experience with SDN (Software-Defined Networking), NFV (Network Function Virtualization), and network virtualization/overlays
  • Strong hands on cloud architecture, with knowledge and working experience in: OpenStack, Cloud Foundry, Server Virtualization hypervisors (KVM, Xen, Hyper-V, VSphere), Linux Containers technologies (Docker, Mesos, Kubernetes), and distributed computing
  • Strong expertise and experience with Linux and Linux security (SELinux or AppArmor knowledge is a plus)
  • Programming/coding and DevOps experience is a plus (Python, Ansible, Chef)
  • Solid understanding of and ability to speak authoritatively to security principles in areas such as network, systems, virtualization, cloud technologies, access control
  • Experience in Security Architecture, with a minimum of 5 years of experience designing and implementing infrastructure in a multi-tenant large datacenter environment and/or cloud computing environment
  • Proven ability to troubleshoot and resolve complex technical issues at Expert level
  • Experience integrating multiple vendor products
  • Bachelors degree (or equivalent) in Computer Science, Math, Engineering, or a related field (Masters degree preferred)
  • Preferred certifications include: CISSP, OpenStack Certification, TOGAF
  • Hands-on experience and strong understanding of technology and enterprise security
  • Solid understanding of compliance, regulatory and legal requirements relevant to the payments processing industry such as PCI, SOX, and GLBA
  • Strong understanding of relevant Industry Principles, Best Practices, and Standards, such as PCI, NIST, ISO, IEEE, and TCG
  • Strong cross-domain and cross-functional knowledge that will enable design of the best possible security technology solutions
  • Has solid understanding of the SSDLC process and follows the process to effectively develop and design solutions
  • Ability to function as an individual contributor and mentor/leader detached from the corporate environment
  • Ability to handle/manage multiple simultaneous priorities, deadlines, and deliverables
  • Excellent verbal and written presentation and communications skills
77

IT Security Architect Resume Examples & Samples

  • Responsible for the design, integration and deployment of security architecture across UA
  • Assists in developing security requirements, design, integration and deployment of security technologies to protect sensitive UA data
  • Perform security risk assessments and gap analysis across UA to identify and document risk and work with IT Security and business units to mitigate risk
  • Lead the data security efforts to protect customer information and UA proprietary data
  • Design and develop security solutions for cloud environments (IaaS, PaaS and Saas)
  • Provide guidance and recommendations around security in the early planning stages of enterprise application projects, in collaboration with the Enterprise Architect
  • Responsible for creating, defining, and implementing UA’s security architectural requirements and associated policies and procedures
  • Understands, advocates, and is responsible for compliance of security standards, best practice principles, and ensures project management and developers/administrators follow all aspects of the architecture process
  • Bachelor’s degree in Computer Science or related field required
  • 7 + years of IT Security experience
  • Strong background in multiple IT Security disciplines
  • Demonstrated experience in understanding and architecting secure cloud environments (AWS and Microsoft Azure)
  • Proven experience with the analysis of complex business requirements and the ability to develop innovative solutions
78

IT Security Architect Resume Examples & Samples

  • Conduct assessment and provide technology risk/requirements to the requestor. Areas covered
  • Excellent communication skills: written, oral, presentation, listening
  • Desired - experience in testing tools, at least one of Veracode, Fortify, OunceLabs, AppScan, WebInspect, Burp
  • Required In order to be a practical SecArch Integrator the candidate must have experience implementing complex applications in an enterprise environment
  • Required working knowledge of programming and scripting languages: Java, JavaScript, C#, C/C++, Perl, Python, Ruby
  • Understanding of geographic regulations and their impact on Security assessments
  • Previous experience in Financial Services is preferred
79

Chief Security Architect, ED Resume Examples & Samples

  • Delivery of a holistic view of security for Asset Management and communicate that view to senior technology and business management for both the line of business and to the larger JPMC community
  • Maturation & execution of the strategic direction for the protection of data throughout its lifecycle (creation, classification, storage, transmission, manipulation, archiving, retention and destruction)
  • Creation of a framework to articulate the strategy to various audiences (senior technology management, other architecture disciplines, application and systems development groups)
  • Provision of data security architecture advisory practices for the execution of projects, programs and corporate/business initiatives for Asset Management
  • Provision of effective leadership and subject matter expertise in Data Security Architecture to support our partners in Technology and Business
  • Creation of principles based on strategy and from these principles, detailed technical requirements that infrastructure engineers and application developers can follow to ensure that systems and applications appropriately protect data
  • Direct management, oversight and responsibility for the delivery of short term initiatives and long term programs
  • You will possess the ability to perform an analysis of current state and provide recommendations on future state solutions
  • You will have an understanding of technology and systems infrastructure, including, but not limited to databases, identity and access management, network security, and encryption
  • You will have demonstrated an ability to drive technical projects to completion
  • You will be collaborative yet able to drive decisions when consensus is lacking
  • You understand how to empower people, build rapport, garner respect and appropriately exercise authority in a collaborative cross-cultural environment
  • You will have a strong background in large enterprise infrastructure engineering, security architecture or application development
  • Previous responsibility for large enterprise technology environment with diverse technologies
  • You have the skills and ability to lead large programs or work across lines of business within complex organizations
  • You have expertise in project management skills; project/program management certification is desirable but not required
  • Strong problem resolution and listening skills
  • Strategic and technical thinking-understanding of systems, infrastructure and various types of applications
  • Proven stakeholder engagement skills, including ability to interact with senior levels of management
  • You have shown the ability to lead programs of work through both direct and indirect authority
  • You have shown the ability to manage multiple tasks simultaneously, handle changing priorities and work independently and in a fast paced environment
  • Relevant certifications (CISSP, SANS GIAC etc.) are désirable
80

Security Architect Resume Examples & Samples

  • Security Architecture (i.e. TOGAF, SABSA, CCP Information Architect)
  • Information Security Management Principles A fundamental understanding of ISM Principles is expected covering an understanding of Physical Security, Disaster Recovery, Access Controls, Authentication, Audit, Governance, Risk Management, Security Architecture, Cryptography, Systems Development and Business Continuity
  • Microsoft Office Tools (Word, Excel, Visio, PowerPoint)
  • IT Systems A fundamental understanding of IT Systems and Services covering Virtualisation, Mainframes, Cloud Services, Hosting Services, Desktop, etc
  • Systems Development A fundamental understanding of IT Systems Development principles for Waterfall, Agile, Spiral, break and fix methods applied and used. Good examples may be Rational Unified Process (RUP) etc
  • Networking Technologies An understanding of the fundamentals of IT networking technologies, the basic building blocks used and how they support a secure architecture
  • Data encryption technologies and products
  • Implementation of single sign-on
  • CSUArchitec
81

Chief Security Architect Resume Examples & Samples

  • Segregation of duties implementations for databases
  • Experience in best-of-breed data retention policies
  • Building strong cross-organizational relationships and effectively influencing staff across the IT organization and broader enterprise
  • Works closely with the other technology architects to ensure that security is properly provisioned in their technology domains
  • Assist other technology architects in defining the variance processes and making variance decisions
  • Stays current with security technologies and make recommendations for use based on business value
  • Architects, prioritizes, coordinates and communicates the choice of security technologies necessary to ensure a highly secure yet usable computing environment
  • Assists in the audit process
  • Degree Required: B.S or higher
  • Solid problem solving and analytical skills; able to quickly digest any issue/problem encountered and recommend an appropriate solution
  • Excellent operational skills; quality and results oriented
  • Strong client service orientation
  • Demonstrated ability to integrate various security & data protection technologies and controls into a cohesive architecture that sufficiently mitigates risk to the company
  • Convincingly articulates vision and strategy for complex technical undertakings
  • Ability to deal with ambiguity and make expert judgments in situations where no precedent exists
  • Familiarity with the business and its security posture
  • Experience with applicable control frameworks and compliance mandates, including PCI, FISMA, HIPAA, and CoBIT
82

Security Architect Resume Examples & Samples

  • At least 5 years experience providing tool & capabilities development and maintenance in support of operational systems
  • At least 5 years experience making recommendations in writing for improvements to existing tools and solutions to keep pace with technology and to project future client’s tool and capability development needs
  • At least 5 years experience providing support to operations in the development of security testing and evaluation tools
  • At least 5 years experience in working with SiteProtector
  • At least 5 years experience in Proventa GX applications
  • At least 3 years experience in Structured Query Language (SQL) commands
  • At least 3 years experience in system and network engineering
  • Security clearance of Minimum Background Investigation (MBI)
83

Security Architect Resume Examples & Samples

  • Influence, consult with and build collaborative working relationships with senior business and IT leadership to help meet long term security objectives
  • Conduct risk assessments, evaluate alternative strategies, develop recommendations and ensure responsive communication with business representatives, security management, and third party vendors
  • Own the overall Security Architecture
  • Lead change to security architecture processes, strategies and standards, as needed in areas such as: information security, Data Loss Prevention, Intrusion Prevention, Threat and Vulnerability Management, and Identity and Access Management
  • Partner with management in defining and setting appropriate, implementable information security policy and ensuring alignment to standard operating procedures, instructions and standards
  • Develop, maintain and implement security policies, processes, tools and methodologies that support security architecture standards and ensure effective evolution of security architecture within the organization
  • Participate in and/or lead forensic investigations of suspected information security issues or in compliance reviews
  • Utilize security expertise and knowledge of new and emerging cyber-attacks threats to make recommendations to management regarding implementation of best practices and/or process improvements
  • Work closely with the regulatory compliance and corporate compliance group to develop the architecture and design as the secure and compliance offering
  • Lead with example by taking efforts to determine the existing vulnerabilities in the systems and software and bring it to the attention of technical leads, lead remediation and ensure compliance
  • Provide informal work coordination and leadership/coaching to less experienced information security staff
  • Master degree in Computer or Science related fields
  • 5+ years of solution architecture experience
  • 3+ years of experience in security engineering, programming and security analysis of products and solutions
84

Chief Security Architect Resume Examples & Samples

  • Executive presence; highly effective communicator; well-honed influencing and negotiating skills
  • Demonstrated ability to integrate various security technologies and controls into a cohesive architecture that sufficiently mitigates risk to the company
  • Deep technical understanding of and experience with security technologies including, but not limited to, intrusion detection/prevention, event correlation, firewall, antivirus, anti-spam, policy enforcement, patch/configuration management, usage monitoring, audit, secure application development, etc
  • Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe (ACF2), Oracle, MS SQL Server Microsoft Outlook, J2EE and .NET applications, etc
  • Excellent overall InfoSec experience (15 years+)
  • Deep understanding of Access Control mechanisms
  • Deep understanding of Identity Management and Federation
  • Experience in Network Reconnaissance
  • Experience in Fingerprinting and Vulnerability Scanning
  • Experience with cryptographic protection mechanisms
85

Assistant VP, Security Architect Resume Examples & Samples

  • Champion new security solution initiatives for the larger Information Security department
  • Participate in the Architecture Review Board to serve as Information Security’s voice in governance of the System / Software Development Process (SDLC), as it relates to security elements
  • Lead proof of concept efforts for the Information Security team
  • Provide input into vision and strategy for the Information Security department and the role of security solutions
  • Manage technical documentation library and roadmap for Information Security solutions
  • Bachelor's or Master's (preferred) degree in computer science, information technology, or related field
  • Minimum 5 years of overall information technology experience
  • Minimum 2 years Information Security experience
  • Minimum 2 years of experience in an architecture role
  • Knowledge of modern enterprise and security architectures, their challenges, common approaches to overcome their challenges, and their inherent security strengths and weaknesses
  • Knowledge of various platforms (e.g., Windows, Linux, etc.)
  • Knowledge of various security tools (e.g., AV, HIPS, firewalls, VPN, DLP, etc.)
  • Knowledge of various database security tools (e.g., activity monitoring, etc.)
  • Working knowledge of various architecture frameworks (e.g., TOGAF, etc.)
  • Information security certifications are a plus (e.g., CISSP, CISM, etc.)
86

Security Architect Resume Examples & Samples

  • Working experience in the following application/network security domains
  • App Security - validation checking, software attack methodologies
  • Cryptography encryption and hashing
  • In depth knowledge of application, network and platform security vulnerabilities. Ability to explain these vulnerabilities to developers
  • Knowledge of standard network model and the risks that present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, vpn, and load-balancers etc
  • Working knowledge of primary operating systems (Unix, Windows, z/OS, Mac OS), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks
  • Experience in implementing complex applications in an enterprise environment
  • Experience in testing tools (Eg. Veracode, Fortify, OunceLabs, AppScan, WebInspect, Burp)
  • Possess working knowledge of programming and scripting languages: Java, JavaScript, C#, C/C++, Perl, Python, Ruby
  • Appreciation and understanding /knowledge of Frameworks, protocols and subsystems: J2EE, .NET, Spring, RPC, SOAP, MQSeries, JMS, RMI, JMX, Hibernate
  • Knowledge of JSP /Servlet/EJB or ASP.NET, HTTP/HTTPS, Cookies, AJAX, JavaScript, Flex / Silverlight
  • Experience of liaising with 3rd Party Entities (exchanges, suppliers, regulators)
  • Previous experience in Financial Services or Global organizations
  • Good listening skills
  • Excellent communication skills, influence through factual reasoning and ability to adjust communication of technology risks vs business risks based on the audience
  • Ability to manage time effectively; handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking
87

Security Architect Resume Examples & Samples

  • Experience in LLD and HLD designing of IT Security architectures
  • Pre-sales experience, working with sales, partners and customers
  • Work within a larger group in multicultural environment
  • At least 3 years of experience on Specialist / Designer / Consultant position related to Security
  • Networking, LAN/WAN, VPN (preferred)
  • Legal regulations
88

IT Security Architect Resume Examples & Samples

  • Operating system security
  • Partner/vendor access to corporate systems/data
  • Constructing a scalable, flexible and implementable security architecture of integrated (standards-based) capabilities with detailed reference architectures that will be ingested by all of DB’s networks, systems and applications. The architecture must be able to be efficiently implemented to enable higher level capabilities (using the OSI services interconnection model) to use security services available across DB’s corporate network
  • Previous experience supporting and/or developing cyber and information security architectures, especially requirements definition and specification
  • Knowledge of cyber security threats, vulnerabilities, protection measures and technologies
  • Proficient knowledge of the cyber security industry and measures/techniques applied to both measure and reduce risk
  • Knowledge of cryptography/public key infrastructure, operating system architecture, TCP/IP and Web application protocols
89

Authentication Security Architect Resume Examples & Samples

  • Define and drive the authentication roadmap for the Global Consumer Bank
  • Single point of contact from Information Security to lead all the authentication efforts in the Global Consumer Bank
  • Design and review architecture of existing and newer authentication mechanism (such as biometrics, tokens)
  • Evaluate the effectiveness and strengths of emerging authentication solutions across the Consumer Bank channels such as Web, Mobile, Call Center, ATMs
  • Review the usage of IAM protocol (SAML, Oauth, OpenID etc), and build strategies to advance to more effective protocols and sunset ineffective protocols
  • Build design patterns for authentication protocols and technologies identifying benefits and risks
  • Ensure technology risk considerations are identified and adequately addressed for new application developments, integration and deployment
  • Prior experience of working as an authentication strategist
  • Strong architecture and design knowledge of authentication mechanism and protocols
  • Ability to effectively articulate the technical components at different levels
  • Past experience of working with authentication technologies as an implementer or a designer role
  • Knowledge of threat modeling and risk assessment techniques
  • 7 to 10 years in Information Security as an Authentication Architect or Security Architect with Security knowledge and skill
90

IT Security Architect Resume Examples & Samples

  • Participate with a team of Architects and Engineers responsible for security compliance monitoring solutions (Tripwire, Splunk, etc)
  • Work with engineers and business analysts to translate business requirements into sustainable technical designs, and validate that technical solutions meet requirements
  • Develop configuration code and scripts for system components
  • Understand and manage the effect of changes and adhere to change processes
  • Collaborate externally with product vendors
  • Technical solution design, implementation, and integration experience in enterprise environments, preferably with information security software
  • Understanding of security solutions (e.g. Tripwire, Splunk)
  • Good understanding of IT infrastructure as well as IT security domain
  • Understanding of project methodologies and lifecycle
  • Ability to build a respectful relationship with other team colleagues and team manager
  • Verbal communication skills including ability to actively listen and interpret
  • Written communication skills including technical specification and clear, understandable emails
91

Senior Security Architect Resume Examples & Samples

  • Experience (minimum 5 years) in information security
  • Experience (minimum 1 year) with AWS environments and the security capabilities and functions associated with AWS including IAM, Security Groups, VPCs, AWS Config, CloudTrail
  • Knowledge or risk assessment methodologies (such as FAIR) that account for value of business opportunities and focus on quantitative measures
  • Experience with CI/CD tools such as CircleCI, Chef, Consul, Artifactory
  • Experience with security assessment tools for on-premise and cloud environments including vulnerability scanners, encryption and key management software and hardware, logging and alerting systems
  • Experience with Splunk, Vault, Security Monkey, Cisco firewalls and networking equipment, SAML 2.0, Oauth2 a plus
  • Experience with security frameworks and standards such as ISO 27001, SOC 2, PCI
  • Knowledge of privacy laws in the US and EU
  • Ability to present findings and summaries of issues to senior management
92

Security Architect Resume Examples & Samples

  • Minimum 10 years of experience working in an Information Security role of increasing responsibility
  • Minimum 5 years of experience designing and implementing large-scale cyber security technology solutions, ideally deployed within a financial services IT environment
  • Minimum 2 years working for a bank or financial institution in an Information Security role
93

Security Architect Resume Examples & Samples

  • Access control and firewalls/Unified Threat Management (UTM) devices
  • DMZ Architecture
  • Intrusion Detection and Prevention (IDS/IPS) systems
  • Identity and Access systems
  • Remote Network Access (VPN)
  • Anti-Malware/Virus (AV)
  • Email and Messaging Security (Hygiene)
  • Security, and Networking, with the last 5 years concentrated in security engineering and architecture or security engineering consulting
  • Technical expertise in at least three or more of these following technologies: ISS, Bluecoat, Cisco, Juniper, Palo Alto, Sourcefire, Arcsight, RSA, McAfee, Tripwire
  • Experience with building, maintaining, reviewing all configs/settings/policies on chosen technologies
  • Experience with analyzing physical and logical network design documentation
  • Experience with analyzing the complete security architecture from the network to desktop and associated security controls
  • Ability to design solutions for addressing gaps in an existing security architecture
  • Expert level knowledge of Transmission Control Protocol/Internet Protocol (TCP/IP), DNS, and security protocols
  • One of more related vendor specific engineering certifications such as Palo Alto, Cisco, McAfee, Tripwire, Checkpoint
  • At least 3 years experience in demonstrated experience in providing detailed technical expertise on security solutions within large corporate environments with a focus on solution implementation
  • At least 3 years experience in of proven effective communication at different levels within and outside the organization - leadership/management, business stakeholders, security vendors and sourcing suppliers
  • At least 3 years experience in providing detailed technical architecture and integration expertise with major Vendor solutions i.e. Cisco, HP, McAfee, RSA, Juniper, Fortinet, Palo Alto, Symantec Checkpoint etc
  • At least 3 years experience in concentrated in security engineering and architecture or security engineering consulting
  • At least 3 years experience in physical and virtual network products and technologies
  • At least 5years experience in professional services delivery focused on network security projects
  • At least 5years experience in concentrated in security engineering and architecture or security engineering consulting
  • Certified in CISSP
94

Mhis Security Architect Resume Examples & Samples

  • Collaborates with 3M HIS architecture, development, 3M corporate IT infrastructure and business owners teams to design secure enterprise security requirements; planning, implementing, and testing security systems according to all security and privacy rules and regulations
  • Prepares security standards, policies and procedures and educate team members
  • Presents at various forums from the executives to technical staff on importance of security architecture in all we do
  • Lead the implementation of NIST SP800-53rev4 technical controls to achieve HIPAA compliance
  • Identify gaps in the existing security architecture
  • Develop scalable solutions that ensure the cost efficient implementation of security
  • Ability to travel 25% of the time
  • Bachelor’s Degree in Computer Science or related field
  • Minimum of seven (7) years hands-on Information Security experience
  • Minimum of five (5) years working as a Security Architect
  • Minimum of three (3) years of experience in designing solutions in a virtualized or a cloud environment
  • Experience using NIST SP 800-53
  • Experience serving as a Healthcare security Architect
  • Advanced degree in computer science focused on Cyber security
  • Experience with Disaster Recovery and/or Business Continuity
  • Experience with Network Security, Network Hardware Configuration, Network Protocols, Networking Standards, and Technical Skills, Dependability, Information Security Policies
95

Senior Security Architect Resume Examples & Samples

  • Bachelor's Degree, Masters, or higher level graduate degree in Computer Science, Information Technology, or related field
  • 6+ years of industry related experience with a focus on infrastructure operations and enterprise architecture
  • Must demonstrate proficiency in architecting large scale solutions
  • Must possess breadth of knowledge across the following infrastructure technology domains: compute, storage, virtualization, networking, end user device form factors
  • 10+ years designing and delivering large, complex enterprise systems
  • Experience designing enterprise solutions
  • Experience with designing cloud computing architectures
  • Demonstrated experience in setting and influencing company-wide strategic architecture/technical direction
  • Ability to work with teams that are geographically distributed and work across different time zones
  • Ability to architect highly complex, global solutions across engineering environments
  • Ability to determine correct solution sizing/scaling based on business requirements
  • Versatility, flexibility and a willingness to work with constantly changing priorities
  • Exceptional interpersonal skills in communication, presentation, teamwork, facilitation and negotiation
  • Ability to demonstrate initiative, good judgment and have effective decision-making skills
  • Demonstrate a strong process improvement mindset and have the ability to achieve results through teamwork, collaboration and leadership
  • Understanding of the software development life-cycle, including traditional large-scale waterfall as well as Agile and Scrum-based models
  • Excellent organization skills - ability to work effectively and independently prioritize tasks in a fast changing environment
  • Ability to plan strategically both long-term and short-term
  • Experience working with vendors to evaluate, select, and implement 3rd party solutions
  • Ability to establish and maintain a high level of trust, confidence and intellectual integrity with both Business and IT partners
96

IT Security Architect Resume Examples & Samples

  • Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates
  • Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses
  • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks and participating in professional organizations
  • Act as SME and provide third-level support and analysis during and after security events
  • Serve as the security expert in providing solution designs and technical consulting services in support of maintaining compliance with all applicable requirements including internal policy, PCI-DSS, FERPA, SOX, state data privacy laws and ISO 27001 controls
  • Minimum 10 years of industry experience and minimum 6 years’ experience working on security architecture
  • Demonstrated security architecture and hardening experience in the following environments
  • Windows Services (e.g. Windows 2008+ AD, LDAP)
  • Operating Systems (e.g. Linux, Windows)
  • Internet Protocols (e.g. IP, DNS, HTTP, SMTP, SSL, SFTP, IPSEC)
  • Experience working with Cisco firewall/VPN/IDS configuration and troubleshooting
  • Experience working with F5 – LTM/APM/ASM
  • Experience with different network types (i.e. LAN, WAN)
  • Working with business owners and 3rd party vendor to implement proper security controls into new on premise and cloud base applications
  • Conducting legal and HR investigations
  • Strong analytical and technical skills with the ability to parse requirements and relate them to appropriate security controls
  • Cisco and Ironport Security Solutions
  • Linux (RHEL)
  • Able to work in a fast paced complex and dynamic environment
  • Poise under pressure and comfort with ambiguity
97

Security Architect Resume Examples & Samples

  • Advanced degree in Computer Science, Information Security or related field
  • CISSP, GIAC (GSEC, GCIH, GCIA, GPEN) or other security certifications
  • CCNA or other network certification
  • Linux/Unix and Windows server administration
  • Experience Coding (C, Java, or PERL are a plus)
  • Experience with security policy and standards development
  • Experience with HIPAA compliance
  • Strong customer service and communication skills
  • Excellent organization and time management skills
  • Standards, security baselines and auditing
  • Packet analysis and network traffic monitoring
  • Knowledge of information security standards and frameworks
  • Familiarity with regulations related to information security and data confidentiality (e.g., FERPA, HIPAA, PCI)
  • Familiarity with desktop, server, application, database and network security principles for risk analysis
98

Security Architect Resume Examples & Samples

  • Create, maintain and drive information security technology strategies and roadmaps
  • Partner with the security group to plan and drive the implementation of the technology and its capabilities. Responsible for the architecture of the technology
  • Architect and design the security solutions for applications or systems, and/or provide expertise and consulting to the project teams on security controls needed
  • Help governing security standards and architecture directions when supporting business needs and establishing business capabilities
  • Serve as an information security advisor to key technology and business stakeholders, establishing trust relationships through active engagement and collaboration
  • 3+ years’ experience in understanding security risks, identifying gaps and creating strategies, roadmaps, and architecture directions and patterns. Demonstrated experience in driving strategies, architecture directions, universal architectures, and working across boundary to improve security posture for the organization
  • 3+ years’ experience in designing, architecting, and implementing complex enterprise applications, infrastructures, platforms and systems, addressing security, performance, scalability, and reliability. Demonstrated ability to perform a risk-based approach to securing applications, databases or infrastructure based upon technology and business needs
  • Extensive knowledge and 5+ years’ experience on one or more of the following
  • Strong ability to think strategically and be innovative
  • Strong ability to look at big pictures, connect the dots and architect the solution
  • Strong ability to drive and lead conversations, and collaborate well with all parties
  • Excellent communication skills, including listening, communicating with Sr. Leadership, business and all levels of IT groups
  • Be a quick learner and adapter, and be willing to challenge oneself
  • Be good at writing concise, high-quality technical documents
99

IoT / MM Security Architect Resume Examples & Samples

  • Develop security requirements for IoT/M2M technologies, devices, applications, and networks
  • Develop Bell IoT/M2M security standards and architecture roadmap
  • Provide content for security requirements in RFPs/RFIs with a focus on Network Security solutions and/or Infrastructure Protection solutions i.e. Firewalls, VPNs, Intrusion prevention/detection, Access controls, Perimeter security, Secure content including Network Access Control (NAC), Data Loss Prevention (DLP), Security Information and Event Management (SIEM), etc
  • Evaluate vendors’ security solutions and participate vendor selection process to ensure they meet relevant industry and Bell security standards
  • Experience in designing and implementing security solutions such as Authentication, Encryption, GRC (Governance, Risk Management, and Compliance), Event Correlation, Identity Management, Instance Management, and Access Management
  • Proven track record and experience developing security policies and procedures and successfully executing programs that meet objectives of excellence
  • Professional security management certification is an asset (e.g. Certified Information Systems Security Professional (CISSP) or other similar credentials)
  • Knowledge of security and privacy frameworks in place in public cloud hosted environments including commonly used open source components such as Hadoop/HDFS, HBase, Kafka, Dockers, Storm)
  • General knowledge of applicable horizontal IoT and M2M technologies in all tiers of the E2E architecture
  • Bachelor’s Degree in Computer Science or relevant discipline – Master’s Degree is an asset
  • Minimum 8 years of working experiences in defining and implementing security solutions (device, network, and/or application)
  • Demonstrated the followings in previous work experiences
100

Security Architect Resume Examples & Samples

  • Leads research initiatives on future industry trends in order to determine their appropriateness for CG's security environment and influence decision-making across multiple technology areas
  • Plays a lead role in the creation of security roadmaps, capability models, and blueprints in support of strategic IT planning
  • Supports the business to understand their needs and assist in planning/decision making, explaining architecture, technology options, business relevance, and value of initiatives
  • Prepares architecture points of view and recommendations for security technologies, which includes socializing with peers and presenting to architecture review boards as well as other stakeholder approval bodies
  • Provide design expertise and make recommendations concerning security best practices to other architects, application development teams and infrastructure teams. This includes applying reference architecture standards in consulting engagements and on projects, harvesting best practices and reference implementations for future use
  • Integrate security requirements into the System Development Life Cycle and contribute to multiple large, complex application projects with cross functional teams and business users
  • Collaborate with members of the Security and Risk team in the development of Security Policies and Standards
  • A minimum of 7 to 10 years of overall IT and security-related experience, three of which should have been spent as a Security Architect or closely related function
  • Architecture experience working on the delivery of complex enterprise systems involving cross functional teams
  • Possess relevant security experience with security policy development, security architecture models, and information security regulatory compliance
  • Experience with authentication, authorization, and encryption controls and technologies required for the entire end-to-end information flow across all technical components: user, browser, Internet, DMZ, portal, Web server, application server, LAN, and database
  • Experience designing and implementing both the technology and process aspects of enterprise-wide identity management solutions including user provisioning, access request & review, federation, single sign-on, Active Directory/LDAP, and privileged account management
  • Experience with designing and implementing cybersecurity technologies to monitor and protect enterprise environments. This would include technologies such as SIEM, DLP, Advanced Endpoint Protection, and Next Generation Firewalls
  • Expert knowledge of best practices and experience with security engineering tasks, techniques (e.g. passwords, encryption, digital signatures), and tools
  • Experience with network security design including remote access, WAN security, Firewalls, IDS/IPS, NAC, Content Filtering and authentication systems
  • Knowledgeable on the current landscape of security products available in the market as well as current technology trends and security vulnerabilities
101

Security Architect Resume Examples & Samples

  • Providing design-time review and guidance to teams building and deploying new technology at Two Sigma
  • Defining security policy and overseeing its execution
  • Assessing and mitigating security risk associated with new and existing systems
  • Threat and risk modeling
102

Security Architect Resume Examples & Samples

  • Architects, prioritizes, coordinates and communicates the choice of security. technologies necessary to ensure a highly secure yet usable computing environment
  • Years of Experience: 3-7
  • Demonstrated ability to integrate various security &
  • Self-motivated without the need for signification management oversight
103

Security Architect Resume Examples & Samples

  • The Security Architecture team is responsible for the definition of security reference architectures that provide roadmaps and target state architectures for key security domains such as IdAM, Cloud, Network, Data Privacy, Bi-Modal IT, and many more. In addition to defining reference architectures, the Security Architecture team functions as a leader across the organization, helping to evangelize the security story and drive a culture of ‘secure by design’ into the Pearson environment and across all its products
  • Within this team, the Security Architect is responsible for reviewing technology designs, and designing security controls and solutions, to reduce the risk to Pearson and its customers. They will help define the information security architecture and design for the enterprise. This is an expert/lead technical role
  • Work closely with enterprise architects, other functional-area architects, engineering, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • 9 years+ in Information Security space
  • Strong experience with security strategy, with a passion to make security realistic, achievable and interwoven with the business fabric
  • Strong experience with cloud provider ecosystems, including Amazon AWS, Microsoft Azure, and OpenStack
104

Industrial Security Architect Resume Examples & Samples

  • Excellent communication and consulting skills
  • Extraordinary command of Cisco technology relevant to Secure Ops
  • Proven ability to architect complex, large scale multi-functional solutions
  • Political savvy for bubbling up issues internally and externally
  • With 5-10 years industry experience in a (preferred) an industrial environment (O&G would be ideal)
105

Active Directory Security Architect Resume Examples & Samples

  • Maintain industry leading knowledge of current and emerging technologies, products, and trends related to Active Directory architecture and management
  • Act as an advisor on best practices for security, privacy, and compliance considerations while designing a robust architecture to enable the business
  • Participating in the definition and lead programs that support the enterprise strategy and architecture for secure access management services, mechanisms and safeguards
  • Work in active partnership with stakeholders to understand business requirements and develop supporting security principles and objectives that will enable the secure growth and evolution of
  • UnitedHealth Group (and communicating those requirements to security and risk management stakeholders throughout the enterprise)
  • Contributing to consistent patterns and frameworks to evolve the company’s security architecture and a clear, comprehensive security framework (and promoting those requirements through partnership
  • With enterprise architecture and IT governance functions)
  • Coordinating with leaders responsible for Infrastructure Services, Application Services, Information Risk Governance & Compliance, Remediation and Release Management to justify and communicate initiatives and risk management outcomes and to ensure integrity of approach
  • Recommending changes, when appropriate, to security policies and control standards and operational practices
  • 5 or more years of experience designing, managing, or maintaining Active Directory environments for a large enterprise, or as a consultant to large organizations
  • 3 or more years of experience planning and executing Active Directory migration or consolidation projects
  • Knowledge of infrastructure, platform, and data security architecture
  • Bachelors degree, preferably in a technical field or equivalent experience
  • Specific experience in architecture, engineering, deployment and/or operational management of enterprise access management solutions
  • Industry-specific certifications, including one or more of the following: CISSP, GSEC, CISM, or Security+
  • Strong leadership skills and experience managing individuals and project/program activities delivered in different geographies and cultures
  • Demonstrated architecture expertise in SaaS, PaaS, IaaS or Cloud computing
  • Knowledge of major compliance frameworks and information risk management regulation and guidance at the State and Federal level, including SOX, HIPAA, GLB, PCI and/or CFR Part 11
106

Senior Security Architect Resume Examples & Samples

  • Design and implement cyber security systems including Security Information & Event Monitoring (SIEM), Internet Content Filtering, Cloud security, Anti-malware as well as security controls in corporate applications
  • Develop security performance metrics
  • Assist project managers in risk assessment, mitigation, and reporting throughout the project lifecycle
  • Develop and consult on the security architecture of IT solutions
  • Lead the mitigation of cyber security risks through system implementations and modifications, insuring all applications and data comply with cyber security policies and controls
  • Identify, propose, schedule, budget, align resources, execute, and report on cyber security projects
  • Provide security consulting for IT projects
  • Bachelor of Computer Science / Information Science preferred or equivalent work experience
  • Demonstrated experience on information security practices relating to PCI, SOX, HIPAA, application security and/or PII data protection
  • Demonstrated experience working with technical and non-technical staff
  • One of the following professional security management certifications; Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials
  • Experience in host system administration, access administration, network engineering, or database administration is desirable, as is familiarity with core network services such as TCP/IP, HTTP, FTP, DNS, SMTP, SNMP and LDAP
  • Experience analyzing, and consulting on availability, access control & security monitoring for a wide breadth of platforms
  • Experience with security protection systems such as SIEM, Antivirus, GRC, DLP and Encryption enterprise-class suites and UTM and NextGen firewall deployment
  • Experience using application security and host security scanning tools such as Backtrack, MetaSploit, Nessus, Qualys, and others
  • Experience with Service Oriented Architecture
  • Experience securing and managing hosted solutions (SaaS and PaaS)
  • Experience securing and managing mobile computing environments
  • Working knowledge of cryptographic technologies, security protocols, security analysis and risk management
  • Basic knowledge of a broad range of IT Security, Controls and Service Delivery standards and frameworks for example, International Standards Organization (ISO) 27001, IT Infrastructure Library (ITIL), Control Objectives for IT (CoBIT), and Capability Maturity Model Integration (CMMI)
  • Ability to execute multiple projects and tasks under tight deadlines
107

Security Architect Resume Examples & Samples

  • 7+ years of increasing responsibility in the development and delivery of web, mobile, and API security architectures
  • 4+ years of experience of defining and implementing PII or PCI compliant security architectures
  • 2+ years of experience defining public, private, and hybrid cloud-based security models
  • Demonstrated ability to develop and influence the adoption of a multi-year security strategy
  • Demonstrated effective and strong written and verbal communication skills
  • Certification in Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified SCADA Security Architect (CSSA) or Certified Secure Software Lifecycle Professional (CSSLP)
  • Demonstrates expertise in the payment and security space, including Credit Card processing, ACH processing, EMV, PA-DSS, PCI-DSS, E2EE, P2PE, Merchant/Acquirer, ISO 8583, payment aggregation, fraud/charge back issues and other emerging payment systems
  • Experience in developing security architecture, frameworks, design patterns, and best practices
  • Experience with Private, Public, and Hybrid Cloud security models
  • Experience with open source technologies such as Java, NGINX, Tomcat, Play, Akka, Couchbase, Rest, Node, and Docker
  • Experience in developing technology roadmaps and strategies
  • Ability to create constructive relationships, influence, and communicate (to project team, IT management, and non-technical staff)
  • Ability to lead complex, cross-functional problem-solving initiatives
  • Experience in researching emerging technologies and trends, standards, and products
  • Developing Others - Supports the development of other’s skills and capabilities so that they can fulfill current or future job/role responsibilities more effectively
  • Organizational Capability - Evaluates and adapts the structure of assignments and work processes to best fit the needs and/or support the goals of an organizational unit
108

IT Security Architect Resume Examples & Samples

  • Bachelor’s or Master’s degree (or equivalent) from a recognised course of study in ICT security or computing together with relevant business experience
  • Extensive experience in the implementation of security best practice (e.g. ISO27001) for complex IT environments
  • Demonstrable experience of working with staff at all levels, comfortable with conducting presentations and running meetings/workshops
  • IT security qualifications (e.g. Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA))
  • Knowledge of government security standards and practical experience of implementing them
  • Broad knowledge of general IT management (such as application selection/development, IT infrastructure, project and supplier management)
  • Experience of working within a multinational matrix management environment / structure and a large-scale, complex international organization, but also within small teams
109

Security Architect Resume Examples & Samples

  • Effectiveness as a Security Architect to operate and maintain a large scale and complex integrated system
  • Effectiveness at providing services within project timelines and constraints
  • Highly effective oral and written communication skills with a variety of audiences
  • Ability to deal with project conflicts and conflicting priorities
  • Develop technical security control architecture and design; engineer information security solution; implement security technology; and evaluate new security technologies and their application to ACMS
  • Implement and maintain an ACMS privacy and security program that meets all applicable State; Federal; and Contractual laws; regulations; and standards
  • Manage and monitor security infrastructure components
  • Advise and consult with project team; client; and stakeholders on operational issues impacting security; including developing a security and privacy training program
  • Develop and manage internal security testing process
  • Develop and manage independent audit program of security controls; including tests of control design; effectiveness; and durability
  • Develop project deliverables related to position requirements
  • Participate; as necessary; in client and community meetings; develop positive working relationships with all Stakeholders
  • 5-8 years of related experience in data security administration as follows
  • Six (6) years' experience performing technical security control architecture and design; information security solution engineering; security technology implementations; evaluating new security technologies; and maintaining and operating at least one SaaS system
  • Five (5) years' experience in security technologies including; but not limited to operating systems; networking; databases; directory services; firewalls; encryption; web services and applying security principles based on best practices and industry standards
  • Five (5) years' experience managing and monitoring critical security infrastructure components including incident management and responses; and advising and consulting with internal clients on operational issues impacting security; including assistance on implementing solutions
  • Current Certified Information Systems Security Professional (CISSP) certification; or equivalent
110

Information System Security Architect Resume Examples & Samples

  • Provide leadership in effective planning and execution of security team activities in accordance with the SOW and SOD, and build and maintain a strong organization that can exceed the client's expectations
  • Develop a trusted advisor relationship with CMS clients, with a focus to be directed by the ES Engineering Manager
  • Serve as the ES lead for all security Assessment exercises in support of FISMA ATO
  • Provide leadership in developing responses to Change Orders affecting security components
  • Provide direction to the ES staff based on overall direction from the Chief Architect and ES Engineering Manager to ensure successful performance and documentation of activities performed by the staff
  • Ensure that Security Portfolio activities are integrated within the Group and across the remaining DECC groups/LoBs as necessary to develop consistent solutions and approaches across the program
  • Provide responsive support to Production issues and incidents; support all testing and LoB development integration needs for Security Services
  • Ensure that security deliverables are of high quality through conduct of peer reviews
  • Coordinate the preparation and delivery of status presentations and reports
  • Ensure that Security Portfolio risks are identified, mitigated and retired in a timely manner
  • Attend and contribute to internal and client facing meetings as directed by the Chief Architect or ES Engineering Manager
  • Ensure the update and own the accuracy of status reporting (such as weekly PIR, Monthly GTL and PMR reports) for Security Portfolio activities
  • Create appropriate documentation in work assignments for security design solutions
  • Support project personnel in resolving fairly complex program problems
  • Bachelor's Degree from an accredited college or university required
  • Master's Degree in Computer Science, Management Information Systems, Mathematics or allied discipline from an accredited college or university preferred
  • At least nine (9) years of hands-on experience as a Data Security expert/architect and in addition to broad experience securing Oracle Database & Middleware installations
  • Experience implementing DLP concepts and solutions
  • Comfortable supporting data security design tasks covering support of enterprise architecture, data engineering and design, information security management and Authentication & Authorization
  • Experience and capability preparing (technical and executive) presentations and papers to demonstrate viability of security design approaches
  • Ability to learn new systems and technologies quickly
  • Strong personal computer and business solutions software skills
  • Strong analytical and problem solving skills for design, creation and testing of programs
  • Good leadership skills to guide and mentor the work of less experienced personnel
  • Ability to work as part of team and independently
  • Experience serving the Federal Government
  • Experience in the health care sector (most desired are health care quality measure reporting systems experience
  • Experience implementing Service Oriented Architecture aligned software
  • Experience developing systems with the Oracle security toolsets used in this program
  • Service Oriented Architecture (architecture/implementation) experience
  • Open Source Governance (design/implementation of governance) experience
  • Experience with COTS data and security solutions, such as
111

Security Architect Resume Examples & Samples

  • Working knowledge of Security principles, techniques and technologies
  • Understanding and familiarity with common code review methods and standards
  • Good understanding of HTTP, JAVA,J2EE, JavaScript, AnjularJS, Spring frameworks and web programming
  • Knowledge on IAM concepts and SSO
  • Knowledge on SAML and XACML
  • Minimum of 9-12 years of Application Security experience
112

Oracle Security Architect Resume Examples & Samples

  • At least 15+ years of experience, excellent communication and coordination skills
  • Experienced (12+ years) in Oracle Identity and Access Management Suite
  • Oracle Identity Management Suite including Identity Governance, Access Management and Directory Services
  • Experience in design, implementation, configuration, integration and deployment of Oracle Unified Directory 11gR2 (formerly OpenDS)
  • Strong Experience integrating OUD with Oracle Enterprise User Security (EUS)
  • Hands on experience in configuration and implementation of Directory Integration Platform (DIP) Synchronization with legacy directory systems, preferably between OUD and AD
  • Experience in OUD Proxy and OUD virtual layer
  • Experience in setting up Set up Enterprise User Security
  • Knowledge of the Oracle Middleware product stack
  • Ability to craft and articulate a solution and an architecture around security requirements
  • Motivated, self-starter, with strong presentation, communication, problem solving skills
  • Ability to address, persuade and interact with senior and executive level positions as well as all levels of system end-users
  • In-depth knowledge of Implementation methodologies and best practices
113

Chief Security Architect Resume Examples & Samples

  • 10+ years’ experience in Managed Security Services/Security Professional Services - Presales, Solution Architecture, Large Bids, IT Outsourcing
  • Ability to perform in a techno-functional role. Good working knowledge with various security vendor solutions around Infrastructure Security, Risk & Compliance
  • Proficient in Security Solution Architecture, System integration, execution of design, Auditing, Gap Analysis and Remediation
  • Interface with internal ERSS and other competencies in Cognizant to ensure integrated solution
  • Ability to technically assess security opportunities, Customer pain points, business requirements and translate these into winning solutions
  • Ability to provide technical pre-sales and post-sales support for product/service offerings with strong business and/or technical analysis background
114

Security Architect Resume Examples & Samples

  • Engineer security of hosted systems including Cloud and Enterprise Hosting
  • Define security baselines and standards
  • Identify threats/vulnerabilities and recommend mitigation strategies adopting a risk based approach
  • Provide practical guidance to Architecture, DevOps and Development teams to support the implementation of security controls, guidelines, recommendations and best practices
  • Support Secure Development Lifecycle (SLD) by performing risk assessments, design reviews and application threat modeling
  • Assist teams in mitigation of vulnerability scan results (from tools such as Nessus and WhiteHat)
  • Ensure security architectures and standard operating procedures are documented
  • Hands-on implementation and oversight of technologies needed to meet and enforce security policies that meet industry best practices
  • Partner with Product Management to ensure that security requirements are properly represented and prioritized
  • Expert understanding of application security and industry standards such as OWASP Top Ten and SANS Top 20
  • Strong understanding of SDLC and Secure Development Lifecycle (SDL)
  • Experience with Software Development Methodologies developing web applications and service oriented architectures
  • Experience with security tools and industry best practices to secure Java based web applications
  • Experience building secure cloud-based infrastructures using Amazon Web Services (using DevSecOps/SecDevOps tools such as Ansible) is a plus
  • Knowledge of network security controls and technologies such as firewalls, intrusion detection/prevention systems, monitoring/SIEM, data loss prevention, authentication/authorization and database security
115

IT Security Architect Resume Examples & Samples

  • Create, maintain and drive information security technology strategy and roadmap
  • Researches/analyzes emerging technologies, designs and advocates new technologies, architectures, and security product in collaboration with system and service owners
  • Provides expert knowledge of solution/application architecture as well methodologies for the software development life cycle
  • Maintains security by monitoring and ensuring compliance to standards, policies and procedures; conducting incident response analysis; developing and conducting training programs
  • Participates and monitors progress and status of tasks and deliverables on projects and escalates issues and risks timely
  • Partners with various cross functional teams to ensure compliance to industry and company standards including ISO 27001, NIST and Cobit standards
  • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications
116

Senior Security Architect Resume Examples & Samples

  • Determines security requirements by evaluating business strategies and requirements, implementing information security standards, conducting system security and vulnerability analyses and risk assessments, recommending secure architecture aligned to business architecture, and identifying/driving remediation of integration issues
  • Creates, maintains and drives information security technology strategy and roadmap
  • Manages end to end delivery of projects with hands on involvement in the development and configuration of products
  • Participates and monitors progress and status of tasks and deliverables on projects and escalates issues and risks in a timely manner
  • Completes market assessments on vendor products, packages and services; tests and implements products solving enterprise information security requirements
  • Suggests and implements alternative security mitigations/compensating controls to allow for business to continue while protecting BCG´s assets
117

Software Security Architect Resume Examples & Samples

  • Serve as an SME in a range of areas, including secure software development, application security, data protection, network and cloud security, identity and access management, cryptography and key management
  • Collaborate and work closely with the Infosec team in identifying, understanding and adapting the security policies and software security standards to FSE's development lifecycle and software stack
  • Work with various stakeholders in the Infrastructure team in designing and architecting secure cloud based applications and offerings
  • Work with product development team and quality assurance teams through various phases of SDLC to continuously improve the security posture of FSE's products
  • Analyze various products and perform threat modeling, code reviews, and security architecture and design reviews
  • Organize and manage static and dynamic application security testing and assist developers in remediating vulnerability findings by providing line-by-line coding guidance
  • Monitoring industry security updates, technologies and best practices to improve security practices within FSE
118

Security Architect Resume Examples & Samples

  • Define, own and evolve the target security architecture for TalkTalk gaining support and buy-in from key stakeholders
  • Develop relationships with key business and technology stakeholders in order to influence and drive the security agenda in TalkTalk
  • Create and maintain “blueprint” documentation that articulates the security architecture vision for TalkTalk
  • Provide technical subject matter expertise in one of the following areas Networking, Application Security, Platform Security (Wintel/*Nix) or similar."
  • Support and influence the business change function in the creation of suitable programmes of activity to deliver an architecture roadmap and help ensure progression towards delivery of the target security architecture
  • Support and ratify solution design activities to ensure solutions are compliant with relevant policies, principles and standards
  • Support realisation of business objectives through the selection of appropriate technology
  • Define and assure compliance with security standards
  • Maintain up-to-date knowledge on industry trends and best practices to provide security thought leadership in TalkTalk
  • Ensure that the security architecture is aligned with business, technology and data strategies
  • Liaise with other teams both within and outside Technology to ensure that their requirements are met by the architectural designs and that the architecture is cost-effective to develop, maintain and operate
  • Supplier engagement in the selection and procurement of product solutions as part of the architectural portfolio
  • Provide consultation services during security incidents
  • Strong Technical Security System knowledge
  • Highly effective communicator
  • Experienced in end-to-end systems delivery
  • Honours Degree or equivalent in Science, Maths or Engineering
  • Undertaken security architecture role in a telecoms environment
  • Chartered Engineer, or similar IT related qualification
119

Security Architect Resume Examples & Samples

  • Overall responsibility for the security road-map
  • Deliver Security Standards that support our Security Policies and Business needs
  • Ensure our Infrastructure(s) (new and retrospectively) complies to Security Standards
  • In-Depth Technical SME for all Security
  • In-Depth Technical Knowledge of Security Protection Tools (WAF, Firewalls, IDS/IPS, etc)
  • Process owner to ensure all new solutions and changes to existing solutions have Security approval
  • Provide technical governance on key strategic projects
  • Reporting to the Head of Security on projects and directorates
  • Proof of Concept Lab tests
  • Requirements gathering from within the business
  • Ability to Write Strategy & White Paper documentation
  • Attending technical standards and regulatory workshops
  • Represent the business and be a technical point of contact to UK authorities
  • Proving technical guidance in relation to cyber security and help drive cyber security initiatives
  • Review and research industry best practices & security technologies
  • Lead the business security strategy and influence cost optimisation
  • Ability to obtain & hold security clearance
  • Expertise in networking protocols
  • Telco Quad Play Security Expertise
  • RIPA, ISO27001 & LIST-X Understanding
  • Network / systems engineering Background
  • Strong stakeholder engagement
120

Security Architect ICS Resume Examples & Samples

  • Support / moderate with OT system standard owners and system vendors about proper system design to meet security requirements
  • Support OT-system standard owners with advice on how to secure their systems
  • Support in evaluating system data flows to define firewall rules
  • Master or bachelor degree in IT Engineering or Process Automation
  • English written & spoken (required), additional languages a plus
  • Professional ICS / OT security certification like GICSP, or IT security certifications like CISSP preferred
  • Fundamental knowledge in IT-Security threat modeling, vulnerability assessments and pen-testing
  • Decisions impact security, cost and success of OT projects at hand
  • Geographical / Business Scope
  • Global Complexity
  • Influence without authority
  • Non homogeneous factory technology
  • Deep Technical Design
  • Failure in the arena would lead to supply chain outages, quality problems in our products and regulatory issues
121

Senior Software Security Architect Resume Examples & Samples

  • Leading the product engineering effort to ensure security of the application suite without compromising supportability, performance, configurability and usability
  • Identify security design flaws and proactively make recommendations for improving product designs security practices - balancing the business impact with the potential risk
  • Recommend security practices which align with contemporary software development practices and strike a balance between absolute, theoretically secure products and products which are demonstrably secure
  • Develop initial proof of concept implementations of security solutions within the product suite including areas such as authentication, authorization, auditing and data security
  • Perform research, recommend solutions, and create proposals based on latest industry trends, and industry standards to meet business requirements
  • Bachelor's Degree in Computer Engineering, Management Information Systems, or a related field
  • 7+ years of experience in technical information systems positions, with at least 4 years of experience in an information security position
  • Must be able to develop positive relationships and effectively communicate with product architects, development engineers, quality assurance personnel, IT & Operations, external auditors and all levels of management
122

Security Architect Resume Examples & Samples

  • Security tool/library build up to simplify security development
  • Security development support, including threat modeling and security assessment
  • 3+ years of security related working experience
  • Solid security programming and security architecture knowledge
  • Knowledge about penetration testing and hacking technique is a plus
  • Knowledge about popular cloud security solutions is a plus
  • Fluent English is preferred
  • Knowledge on J2EE development is a plus
123

Security Architect Resume Examples & Samples

  • Establish and lead the Enterprise Security Program to include policy and implementation of security best practices
  • Identifies, measures, controls and minimizes security risks to information systems including our production SaaS systems across a broad range of disciplines including application, network and host security
  • Works with architecture teams to ensure that all newly developed and legacy applications and infrastructure implementations are in line with security policy and are compliance to the required frameworks (ISO, PCI DSS 2.0, OWASP, NIST 800-53, etc.)
  • Provides technical vision for security within the Architecture framework based on current security industry trends and best practices
  • Develops and maintains architectural reference material for the application software and infrastructure as well as the corporate environment to ensure that security practices are being implemented in a repeatable fashion every time a new project is implemented
124

Security Architect for SAP Anywhere Resume Examples & Samples

  • Security architecture research, evaluate and implement security best practices
  • Security process definition and execution to ensure secure software is produced
  • 7+ years of development experience
  • Good communication skill
  • Presentation skill is a plus
125

Security Architect Resume Examples & Samples

  • Join an agile team to lead the development and to architect new security features
  • Assist in developing our security strategy and in bringing new ideas to complement our existing features with new cloud initiatives
  • Monitor current and future trends in infrastructure security technology and influence product and technology direction
  • Identify core initiatives in information security and help define and vet product requirements
  • Work with Engineers to design solutions to today’s security exposures in the Enterprise and Service Provider space
  • Work collaboratively across multi-disciplinary teams throughout the company as a subject matter expert in information security with solution and implementation focus
  • Contribute to and support effort to build intellectual property via patents
  • Experience with container-based software using Docker and other container based tools
  • Expertise in Analytics, data mining, machine learning, statistical models, data clustering and classification techniques
  • Experience with DNS and DHCP
  • Go experience is a big plus
126

IT Security Architect Resume Examples & Samples

  • Plan security systems by evaluating network and security technologies
  • Develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices
  • Conduct system security and vulnerability analysis and risk assessments
  • Study architecture/platforms to identify integration issues
  • Create logical and physical architecture diagrams adhering to industry standards
  • Implement security systems by specifying intrusion detection methodologies and equipment, directing equipment and software installation and calibration
  • Create, transmit, and maintain keys and complete necessary documentation
  • Verifiy security systems by developing and implementing test scripts
  • Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses
127

Security Architect, Consultant / Specialist Resume Examples & Samples

  • Provide end to end security architecture guidance in the form of security requirements, security design through defense and attack centric approaches
  • Provide high level security guidance to business units during ideation stage to securely enable the business use cases desired by the business
  • The architect will document the outcomes of the engagements to contribute back to an enterprise view of the security architecture in the form of security standards, patterns and/or security reference architectures
  • Participate in security governance boards to ensure security architectural standards, patterns are adopted across IT implementations in alignment with the security architecture program
  • Present the results of the security architecture engagements to business and technical audience alike along with executive leadership
  • Formally document the artifacts for various phases of security architecture engagements phases and receive appropriate sign-off from the business, IT etc
  • Establish partnerships with the business and act as a trusted advisor for respective line of business
  • A minimum of 10 years of Information Technology experience, including development and maintenance of IT technical architecture and standards
  • Experience with large complex projects or multiple projects of moderate complexity
  • Experience with projects with budgets of up to $50M with multiple sites or regions, and/or up to 20 integrated work tracks
  • A deep understanding of security concepts and their application across multiple technology layers application, network, platform, data etc
  • 4 + years of Information Security Experience. With 2+ years in security architecture for a medium to large size organization
  • Experience building security architecture for security problem spaces and security controls
  • Ability to translate business requirements and priorities into security architecture standards
  • Strong leadership skills and ability to listen and build consensus and collaborate with business, IT and security groups at KP
  • Ability to translate security concepts into business language and present to executive level audience
128

Senior Security Architect Resume Examples & Samples

  • Architect new and improved security innovations that resonate in industry
  • Be an architectural leader: define software and technology standards and practices
  • Participate in strategic product planning for engineering deliverables
  • Foster a culture that encourages flexibility, openness and innovation
  • Formulate long-term objectives and standards of performance for IBM Cloud technical teams
  • Promote the growth and evolution of technical team members, maximizing capabilities
  • Prioritize activities and available resources (including risk mitigation) to meet organizational needs
  • Collaborate across the organization to support company initiatives, as well as client needs
  • Evolve Key Performance Indicators (KPIs) to communicate areas of success and improvements
  • Previous proven experience with
  • Previous experience responding to real time security attacks and incidents at scale
  • Previous experience understanding international security requirements, regulations and standards
  • Previous experience interacting with cyber security divisions across international governments and law enforcement
129

Security Architect Resume Examples & Samples

  • Solutions - Define and deliver on-site technical engagements with partners and customers. This includes participating in pre-sales on-site visits, understanding customer security and compliance requirements, and proposing and delivering packaged offerings, and delivering custom solution engagements
  • 3+ years experience in IT security, compliance and risk management, including privacy, controls, etc
  • Experience advising customers on architectures meeting industry standards such as SAS70, SOC1, FISMA, etc
  • Current hands-on software development experience required; Internet-related business models preferred
130

Security Architect Resume Examples & Samples

  • Define the IT architecture frameworks and principles to support CHI information security policies and requirements
  • Provide leadership to the IT application development, database design and infrastructure services team to ensure compliance with CHI security policies, industry regulations and best practices
  • This position will report directly into the CTO
  • Maintain a broad understanding of the existing CHI information security and compliance infrastructure
  • Keep current on industry trends and emerging security technologies to evaluate and recommend those that will increase performance, reliability, cost effectiveness, infrastructure flexibility or otherwise provide value to CHI
  • Define, develop and maintain IT architecture standards and principles to ensure CHI information security policies and requirements are met
  • Work closely with CHI CISO to understand security priorities and requirements, and incorporate these into the security architecture
  • Define and maintain the standards to embed CHI information security requirements into IT solution design, development and implementation
  • Provide security leadership and guidance into technical approach, design and implementation of enterprise security capabilities
  • Help govern and direct security standards and architecture directions when supporting CHI’s needs and establishing CHI’s IT capabilities
  • Develop the principles to integrate security metrics and accountability into the CHI architecture framework
  • Recommend and design changes, when appropriate, to security frameworks and control standards to enhance CHI’s operational practices
  • Have a cross-functional understanding of the IT architectural domains, while also having deep subject matter expertise within the security domain, and the ability to communicate its role and importance to other IT domain architects
  • Bachelor’s degree in related field required; Master’s degree in related field preferred
  • 10+ years’ experience in an IT environment, with experience leading enterprise security architecture teams and managing and providing technical leadership for complex enterprise security projects
  • Knowledge of infrastructure, platform and data security architectures, and best practices
  • Knowledge on threat landscape, security threat and vulnerability management, as well as security monitoring and analytics
  • Knowledge in compliance frameworks and requirements such as PCI, HIPAA, SOX, etc
  • Demonstrated ability to perform a risk-based approach to securing applications, databases, or infrastructure
  • Ability to communicate with and take direction from the CHI Enterprise Architect
  • Healthcare provider industry experience is highly desirable
  • Demonstrated ‘big picture’ thinking – the ability to see how parts interact with the whole while retaining the ability to focus on security domain capabilities
  • Demonstrated process orientation – the ability to build repeatable and reusable processes
  • TOGAF certification is desirable
  • Reverence: Having a profound spirit of awe and respect for all creation, shaping relationships to self, to one another and to God and acknowledging that we hold in trust all that has been given to us
  • Works collaboratively and supports efforts of team members
131

Security Architect Resume Examples & Samples

  • Provide security architecture and engineering design consulting to the Global Business Units (GBUs) Product
  • Development organizations and GBU/Oracle Cloud for Industry (OCI) hosting organization
  • Provide software development consultation as needed to GBU product development staff on aspects of product development and cloud security
  • Provide IT and operational infrastructure security analysis and guidance to secure Cloud Operations infrastructure and services
  • Perform technical security assessment and pen-test activities within the GBUs customer hosting cloud environments, legacy and OCI data center infrastructure
  • Assist OCI and GBU Application Management System (AMS) groups in hosting operations to resolve security incidents and manage corrective activity
  • Evaluate relevant aspects of IT security, operation security, software product security, systems security, and other emerging security technologies to support OCI business objectives
  • Follow-up on implementation of corrective actions from engineering design reviews, assessments and incidents, and provide direct guidance for security remediation activities to the GBU lines of business and OCI
  • Be a primary security point of contact for the GBU development lines of business, and liaise with other corporate security and IT security organizations as necessary to fulfill OCI organizational responsibilities
  • At least 7 years experience with security architecture design and systems development operations
  • Experience in software security lifecycle, information security, and technical aspects thereof. Cloud computing experience highly desirable
  • Ability to consult on applications security systems engineering designs and the implications for customer impact and IT security operations
  • Knowledge of web application testing, infrastructure testing, manual testing, software code reviews
  • Knowledge of industry security and regulatory standards information security such as ISO-27001, NIST, PCI, HIPAA, etc
  • Excellent team player -- Leading contributor individually and as a team member, providing security consulting to internal customers
132

Security Architect Resume Examples & Samples

  • Identify & define security relevant data sources for inclusion in the SMA’s event repository from perimeter devices, database & application components, cloud service providers & end-user communication systems such as e-mail, text & video conferencing services
  • Assist Product Management & Engineering in the prioritization of feature selection & development to ensue SMA remains relevant as the Security landscape evolves
  • Define technical & functional approaches for threat identification including pattern matching via heuristics and machine learning algorithms
  • Help define requirements for data visualization paradigms and tools that enable SOC and Security Experts to efficiently explore event data
  • Communicate & rationalize technical approaches to Oracle Senior Engineering management
  • Assist Product Management in the creation of Go-To Market Materials such a demo scripts and messaging collateral
  • Communicate SMA’s vision & capabilities to prospects
  • Represent SMA’s vision & capabilities at industry events
  • Remain current with Industry best-practices
  • Maintain an active awareness of the evolution of the threat landscape for customers and prospects of SMA
  • Help non-security expert engineering staff to build an awareness of the techniques used by Security experts in adversary & threat identification
133

Senior Security Architect Resume Examples & Samples

  • Single Sign-on and Federation (Kerberos, SAML 2.0, ADFS, OAuth 2.0, OpenID Connect, etc.)
  • Two-factor Authentication (especially One-Time Password solutions and Certificates on Smart Cards)
  • Unix and Linux Security (especially privileged command management)
134

HW Security Architect Resume Examples & Samples

  • PhD in Computer engineering / Computer Science or equivalent experience
  • Minimum 6 month experience in security architecture, computer architecture and/or system software architecture
  • Minimum 6 month experience in perform security analysis, develop architectural security specifications and/or do early prototyping
135

Senior Security Architect Resume Examples & Samples

  • Minimum of 7 to 10 years in the engineering and architecture in information security
  • CCIE, CISM, CCISSP, GSEC, SSCP, GIAC, CEH CWSP or other Security Certifications a plus
  • Knowledge of
  • Expert Knowledge and Experience in VPN Technologies and Deployments - IPSec, 3DES, AES, IKE, DMVPN, AnyConnect, Full Tunnel/Split Tunnel Client VPN Solutions, Site to Site VPN Solutions
  • Expert Knowledge and experience in AAA appliances - Cisco ISE, ACS, Juniper UAC, Open RADIUS, NAC, AAA, Single Sign On, RBAC/RBNA
  • Experience and Knowledge of X.509 Certs, PKI, CA Authorities, Cert Provisioning (SCEP) and Cert Revocation Services (CRL,OCSP), Kerberos, Key Management
  • Experience in Technologies: Java/J2EE, JSP/ Servlets, LDAP, JDBC, SAML, oAuth, OpenID, Shell, PHP, ASP, XML, HTML, CSS, JavaScript, JAX-RS CXF
  • Knowledge of Routing protocols EIGRP, OSPF, BGP, MP-BGP, VRF, Multicast, AnyCast, MPLS, DSCP/QoS
  • Knowledge of Wireless standards and protocols - WPA/WPA2, 802.1x, 802.11a/b/g/n/ac/r/k, CAPWAP, RMM, WMM, X.509, MDM, Captive Portal, Guest Access, Posturing, Profiling, DACLs, PACLs
  • LDAP, non-SQL DB, Cassandra
  • DNS/DHCP services a plus
  • Python, Go, Perl Scripting experiences a plus
  • Container and KVM experience a plus
  • Demonstrate strong communication skills to align cross functional teams and objectives and promote team outcomes
  • Apply group problem solving and design making techniques to build understanding and agreement among people to achieve shared outcomes
  • Work with internal clients and partners to understand business needs, offer advice and solutions and operating from a position of expertise balanced with a collaborative approach
  • Able to balance requirements from business, operations and industry trends to facilitate solutions that deliver ongoing capabilities
  • Requires attention to detail, ability to meet multiple deadlines and adapt to changing priorities
  • Requires excellent analytical, problem solving, organizational and time management skills
  • Ability to make timely and effective decisions that are based on sound judgment and business rationale
136

Security Architect Resume Examples & Samples

  • Lead and oversee security architecture, design, and cybersecurity process for all of Tridium’s commercial products
  • Define cybersecurity best practices, processes, and workflows. Work to design and implement security controls into our software products
  • Responsible for threat modeling, providing security design reviews and assessments, security code reviews, maintaining a threat register for all projects, and periodically presenting this work to technical management team and other security architects and engineers
  • Acting as Technical Product Owner (TPO) for Cybersecurity for all projects, work together with Scrum Teams to help prioritize cybersecurity stories into the backlog
  • Drive continuous improvement in product security and champion changes to the organization to be able to respond to new threats
  • Direct engineering efforts in addressing potential security vulnerabilities
  • Obtain and maintain an (ISC)2 Certified Secure Software Lifecycle Professional (CSSLP) Certification
  • Reports directly to Tridium’s Chief Architect
  • Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering or a software related discipline, from an accredited college or university plus a minimum of 15 years of experience in software engineering, with a significant amount of experience focused on cybersecurity, security architecture and design, cryptographic protocols, and other security technologies. In lieu of a bachelor's degree, must have 20 years of experience in software engineering with a significant amount of experience focused on cybersecurity
  • 5 years of experience leading software architecture and hands-on involvement in designing and testing software solutions, managing security risks, writing and assessing threat models, leading code reviews, and providing team leadership
  • 10 years of experience writing, debugging, and testing Java code
  • Proven success working in a team-oriented environment and demonstrated problem solving skills
  • Master’s degree in Computer Science, Electrical Engineering or similar discipline with an emphasis on information system security
  • Technical leadership experience in software engineering, preferably in the information security field
  • Certifications in security and privacy demonstrating deep practical knowledge such as the CISSP certification
  • Familiarity with security standards for industrial control systems, such as ISA/IEC 62443
  • Experience and knowledge of industry wide standards such as NIST 800 series, FIPS 140-2, PCI-DSS, ISO computing security standards, and Common Criteria for secure computing, as well as relevant guidelines and best practices for cyber security
  • Understanding of multiple development processes and practices such as RUP, Agile/Scrum, etc
137

Senior Security Architect Resume Examples & Samples

  • 10+ years experience in IT Security with a desire to keep learning
  • Strong experience in large scale, complex system integration projects in a cross-domain, - cross-partner, multi-application, multi-sourced technology environment
  • Experience developing security architectures and implementation plans
  • Knowledge of industry trends for secure networking, secure infrastructure, application security and data protection
  • Possess a strong technical background encompassing but not limited to Identity and Access Management, Public Key Infrastructure, Data Protection, Trusted Platforms, network threat mitigation and security governance
  • Knowledge of infrastructure, network, databases, systems concepts
  • Experience in establishing and maintaining security standards, policies, processes, best practices and design patterns
  • Experience in evaluating design alternatives
  • Experience with information security assessments of applications and infrastructure
138

Security Architect Resume Examples & Samples

  • Overall system security Design Authority for the system security architecture of the system, leading a team of security architects
  • Defining security organisational structure, security processes, security technical subsystems and components, implementation and integration within overall wider systems integration projects
  • Presentation of security solution and designs to senior management and clients
  • Working on bids and projects to develop a security architectures meeting the security requirements, budget constraints, effort estimates and security plans
139

Perimeter Security Architect Resume Examples & Samples

  • Responsible for designing security solutions to business technology requirements, and according to existing standards
  • Able to develop technology designs, supervise the implementation of these designs, verify their proper completion, and act as a consultant for any issues encountered over the project lifecycle
  • Capable of working with line-of-business and business technology staff to understand and meet project requirements
  • Acts as a trusted partner to provide solutions to their needs
  • Engages in high severity business impacting production incidents and problem tickets to work through to resolution
  • Able to adjust designs to meet business-required levels of cost, reliability, and data security. Able to understand, formulate, and communicate complex designs with other technology partners within TI
  • Assists in the training of junior associates
  • Engages program management and product engineering teams for process and application improvement opportunities
  • Reviews system documentation for accuracy and updates as necessary
  • Provides feedback to product teams as to the catalog of standard products, and business requirements for changes to the catalog
  • Firewalls:Checkpoint 61000/41000 Security System, Nokia, Fortinet firewalls, Juniper SRX series and Netscreen,
  • Virtual Firewalls: VMs with multi-hypervisor support [VMWare ESXi/NSX, Citrix SDX, KVM (CentOS/RHEL), Ubuntu, AWS], and NFV firewalls (controller and/or non controller based)
  • IDS/IPS: Tipping Point, Imperva, IBM,
  • Malware/Cyber Threat Mitigation: FireEye, Cyphort, Vectra, Cloud based,…
  • DDoS Mitigation: Arbor PeakFlow, Prolexic, Premise/Cloud based servicing,…
  • Database Activity Monitoring: Imperva SecureSphere, IBM Guardium,
  • Proxy Services: BlueCoat, F5, A10, Fortinet,…
  • System debugging and troubleshooting
  • Detailed designs and configurations
  • Experience with designing and deploying low latency environments
  • Experience designing and deploying DMZ
  • Adept at keeping abreast and quickly learning new security technologies
  • Able to conceptualize, comprehend and translate complex security scenarios from an end to end perspective
  • Ability to link and label the dots, visualize and communicate the big picture
  • 10+ years working in Information Technology
  • Excellent interpersonal skills, verbal and written communications skills and presentation skills
  • Problem solving and analytical capabilities
140

Security Architect Resume Examples & Samples

  • 10+ years’ experience in IT security, compliance and risk management
  • Significant experience building security reference architecture for hosted and cloud deployments
  • Demonstrated track record of success in helping deploy enterprise business solutions in a compliant manner
  • Experience in advising stakeholders on architectures meeting industry standards such as PCI DSS, HIPAA and NIS/DoD frameworks
  • Demonstrated ability to think strategically about business, product and technical challenges
  • Experience with encryption, consolidated logging, vulnerability management, and DDOS prevention designs
  • Experience in software security principals (i.e. OWASP, penetration testing, application testing)
  • Strong verbal and written communication skills and ability to lead effectively across organizations
141

Security Architect Resume Examples & Samples

  • Comprehensive grasp of emerging security technologies in one or more of mobile, networks and cloud services. (Not all are required, though a core competency in these areas will be necessary)
  • Understanding of security strategies and technologies in a large enterprise
  • Experience of enterprise architecture processes such as TOGAF or SABSA
  • Understanding of threats and attacks against the common platforms
  • Some specific knowledge in our target areas (depending upon core competencies)
142

EDW Security Architect Resume Examples & Samples

  • Formulate security solution options and recommendations for the Enterprise Data Warehouse
  • Provide technical knowledge, project management and leadership to implement the solution
  • Knowledge sharing across the Enterprise Reporting team, the broader IT organization and the business as necessary
  • This location can be based in Monroe, NC or Windsor Locks, CT
  • Experience in security solutions and implementation in an Enterprise Data Warehouse environment
  • Experience with row and column level database security
  • Strong working knowledge of SQL
  • Experience with LDAP/Kerberos and proxy user authentication
  • Working knowledge of data encryption solutions
  • Experience working with controlled technical information such as ITAR data and other data privacy requirements
  • Customer focused, with strong interpersonal written/verbal communication, organizational and leadership skills
  • Ability and desire to quickly learn new technologies
  • Experience managing consulting relationships and resources
  • Attention to detail and following standards and best practices
  • Ability to work with the business, understand business processes and deliver in an agile manner
  • Highly motivated, self-starter who can deliver results
  • Understanding of the system development life cycle; software project management approaches; and requirements, design and test techniques
  • Understanding of SAP and SAP Business Objects security preferred
  • 5+ years of experience in security design and implementation
143

IT Security Architect Resume Examples & Samples

  • Work within a multi-disciplinary security team to effectively manage all aspects of information security within a dynamic healthcare firm
  • Work with an inter-disciplinary team to document business requirements and translate in to security designs that effectively protect sensitive company data
  • Ensure security controls in support of HIPAA and SOX compliance are uniformly implemented and enforced
  • Provide after hours and weekend support of the system when needed
  • Minimum 8 years of professional experience, with 5+ years of experience in information security and/or IT risk management
  • 5+ years of experience architecting solutions with a concentrated focus on security
  • 3+ years of experience performing network and application security penetration testing and/or threat assessments preferred
  • Ability to remain flexible and adapt to changing priorities with promptness, efficiency and ease
  • Bachelor’s degree in Computer Science, equivalent certifications, and/or equivalent experience
  • CISSP or SANS GIAC certifications preferred
  • Expert knowledge in IT infrastructure/security designing, maintaining, and supporting Microsoft Server environments
  • Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software (McAfee EPO), authentication systems, log management, content filtering, etc
  • Ability to perform information security activities, such as vulnerability scanning and patching, assessing security risk, IT vendor management, and security design
  • Ability to identify, escalate and solve information security problems
  • Knowledgeable and experienced working with various security and compliance frameworks including HIPAA, SOX, FISMA, and NIST Security standards
  • Expert knowledge of AD, ADFS, PKI in Windows Server 2008/2012 R2
  • Experience maintaining, and supporting Linux/Unix Server environments is consider a plus
  • Proficient in analyzing network architecture and devices including firewalls, switches, routers, VPN Concentrators, and segmented VLAN environments
  • Proficient with security tools and techniques, including performing internal and external network vulnerability assessments and penetration tests and developing reports based on results is consider a plus
  • Demonstrated experience in computer security combined with risk analysis, audit, and compliance objectives
  • Highly responsive and proven professionalism in communication, interpersonal, analytical, and organizational skills
  • Strong skills implementing and configuring security components
  • Excellent communication and project management skills
144

Security Architect Resume Examples & Samples

  • Understand and translate customer requirements
  • Security design, build and support activities of the Enterprise Data Warehouse architecture that meet the requirements of the organization while utilizing best practices
  • Provide business overviews and communicate strategies to stakeholders as it relates to security
  • Create and maintain documentation for the Enterprise Data Warehouse environment security solutions
145

Senior Security Architect Resume Examples & Samples

  • Influence and contribute to a security program that encompasses one of the world's largest global providers, across an entire stack from bare metal / Infrastructure as a Service (IaaS) to Platform as a Service (PaaS), Software as a Service (SaaS) and the services and technologies needed to support this
  • Develop or increase IBM cloud security expertise, a skill that is in great demand by industry
  • Work on a wide variety of security issues and domains, rather than being boxed into a single role
  • Work side by side with some of the world's most capable and recognized cloud security experts
  • Define, lead and deliver information security governance across the Cloud Business Unit (BU)
  • Lead and deliver on the Jewel Code protection program across the Cloud BU
  • Conduct Business Continuity and Security reviews
  • Drive and monitor compliance to Business Continuity
  • Compliance enablement (integration of technical policy)
  • Passionate about security, yet have an understanding that security exists to support and assist company business objectives
  • Ability to work independently with or without direction and/or supervision
  • Ability to prioritize and multitask
  • Calmness and clarity of thought under pressure and ability to maintain confidentially
  • Accept responsibility and personal accountability
  • Minimum of 5 years' security experience
  • Previous experience as Information Security Lead, Team Manager for a large multi-national or Information Security program and be conversant with industry standards and best practices
  • Previous experience as a lead for Business Continuity
  • 10 years of managerial experience and ability to coordinate resources across organizational boundaries
  • Knowledge of ISO27001/2 information security standard, Control Objectives for Information and Related Technology (CoBIT) and Sarbanes-Oxley
  • Knowledge of the Cloud Security Alliance (CSA) frameworks
  • 10 years of security domain related experience
  • Current Certified Information Security Manager (CISM) or Certified Information Systems Security Professional (CISSP) certification is required
  • Knowledge of Cloud PaaS - SaaS Deployment Model and Security in Continuous Delivery Environments
  • 2-4 years' experience in Security Operations
  • 2-4 years' experience in Security Product Management
  • 2-4 years' experience in Security Project Management
  • 2-4 years' experience in Secure Engineering Framework
146

Senior Security Architect Resume Examples & Samples

  • Work across the Cloud Business Unit (BU) to support customer enablement of security for Cloud
  • Ownership of SaaS Trust site and continuous updating
  • Define a project plan and execute against it for addressing gaps in current champion model
  • Previous experience as Information Security Lead for a large multi-national or Information Security program and be conversant with industry standards and best practices
  • Previous financial services experience
  • 6+ years' of security domain related experience
  • 2-4 years' experience in Vulnerability Management
147

IT Security Architect Resume Examples & Samples

  • Leads and develops security design and architecture solutions on large enterprise projects
  • Leads and develops solutions that embrace strategic direction and security reference architecture
  • Translates business problems into tangible, sustainable solutions
  • Monitors and drives project results against technical specifications
  • Identifies design alternatives that satisfy the system requirements and presents pros and cons for each solution for business decision
  • Develops high quality architecture deliverables, conducts formal design reviews, and obtains approval from key stakeholders
  • Develops solutions by analyzing information requirements; determining systems architecture, components, and technologies; studying business operations and user-interface requirements
  • Thorough knowledge of, and experience with industry best-practice approaches to information security, information assurance (e.g. ISO 27001, 27002) and risk management
  • Confirms architecture capability and flexibility by developing analytical models; completing validation tests
  • Assists PM in developing project plans, specifying goals, strategy, scheduling, identification of risks, contingency plans, and allotment of resources for each phase of the project
  • Provides technical decisions on projects, program direction, and application modifications
  • Stays abreast of current technology, new technological advances and company standards
  • Creates technical architecture that ensures proper interoperation and integration among existing and proposed systems and allow for proper linkage to, and achievement of key business strategies
  • Uses sound judgement and evaluates the many layers of defence to ensure introducing a new technology or process is justified against the risk of not doing so
  • Bachelor’s degree in Computer Science or related technical discipline or equivalent experience
  • Requires a minimum of 10 years related experience using multiple technologies
  • Excellent knowledge of Experians products and technical environment, including interrelationships of systems
  • Ability to estimate financial impact of technical architecture alternatives
148

Security Architect Resume Examples & Samples

  • LDAP and Active Directory expertise
  • Understanding of email systems, DNS, and Internet concepts
  • Active Directory Federation Services (AD FS) 2.0
  • Azure Active Directory Sync (AAD Sync)
  • Exchange Server 2013/2010/2007 and exposure to 2003
  • Windows PowerShell
  • Microsoft Office 2010 and Microsoft Office 2007
  • ActiveSync/Mobile Devices and mobility
  • Microsoft SharePoint Server 2010 or Microsoft Office SharePoint Server 2007 is a plus
  • System Center (SCCM) knowledge is a plus
149

Microservices Azure Security Architect Resume Examples & Samples

  • 10+ years of total IT experience
  • Experience in both Stateless and stateful micro services
  • Experience in event driven architecture
  • Deployed and managed large service orchestration technologies
  • Experience with Service discovery
  • Experience with C# and .Net programming
  • Virtual Actor model experience
  • Azure service Fabric Framework experience
150

Software Security Architect Resume Examples & Samples

  • Develop Mercer’s secure-by-design product development standards for emerging technology stack
  • Define product development security standards that complement Mercer’s agile continuous integration and deployment DevOps model
  • Enhance Mercer’s existing secure software development practice to align to micro-service strategy
  • Work closely with product development colleagues to determine areas for integration of processes and collaboration. Provide expert-level support for the business in areas of secure development
  • Develop metrics to track and report on trends in secure product development
  • Support new technology and infrastructure investigations and proofs of concept
  • Support Mercer Next Generation application and data platform by providing guidance on security by design
  • Review software related project and product material to guide and ensure selection, development and implementation of secure solutions in alignment to Mercer’s security standards and requirements
  • Work with Mercer Product Development and Delivery team and Enterprise architects to meet application and data security requirements
  • Identify opportunities to enhance the portfolio of cyber security controls and capabilities
  • Develop secure coding processes and support related static and dynamic testing solutions, including evaluating and selecting new testing technologies
  • Prepare application security metrics and performance indicators by collecting, analyzing, and summarizing data and trends for executive teams
  • Manage the vulnerability assessment and remediation activities, including tracking and monitoring applications and other activities to maintain secure state
  • Provide direction on software security fixes and drive and monitor remediation progress
  • Create and deliver training materials to software development organizations across the company
  • Conduct security research to keep abreast of latest security issues. Track and understand emerging security vulnerabilities and best practices related to secure software development
  • Evaluating opportunities to analyze and integrate threat information and indicators into the existing product development process
  • 5+ years minimum of experience within an Enterprise Architecture group focusing on security
  • 8-10 years minimum of application development experience
  • Strong subject matter expertise in application development and secure coding standards
  • Working knowledge of application & infrastructure development methodologies and industry best practices, including familiarity with JavaScript, Python, Java, and .NET
  • Working knowledge of database technologies including MongoDB, MySQL, Cassandra, MS-SQL
  • Working knowledge in all areas of technology (infrastructure, commercial applications, software development, end-user platforms, IT operations)
  • Ability to communicate and present effectively with all levels in the organization
  • Strong interpersonal communications skills including writing and presentation skills
151

Security Architect IBM Nordic Resume Examples & Samples

  • Overall Security Architecture experience
  • Has been active as IT architect for at least 8 years at least 3-5 years as Security Architect
  • Has knowledge of one or more Security Frameworks and have implemented security architectures based one of these frameworks (like for example ISO 2700X, TOGAF, NIST Cyber Security Framework, ISF Standard, SABSA, CCP Information Architect)
  • Has built up Industry specific knowledge in at least two different industries
  • Has experience in defining security architectures in a complex multi-technology context
  • Can perform risk assessment of an existing IT environment
  • Has done High Level and detailed architectural design of one or more Security Technologies (SIEM, IAM, DLP, Network Security, Active Directory, Cloud Security)
  • Design and implementation of Infrastructure, Applications and Cloud solutions
  • The ability to design security solutions such as DLP, SIEM, MLS, IDAM, ISIM and ISAM
  • Security in the SDLC (Software Development Life Cycle)
  • The ability to configure and implement security products
  • Information Security Management Principles
  • The ability to create high quality documentation such as Design architecture, Presentations and Risk Assessments
  • Knowledge of Security Standards and best practices
  • Team Leader
  • Architectural Thinking
  • Fluent in English and one of the languages in Nordic countries (preferably Norwegian)
  • Capable of communicating and presenting Security Solutions to business stakeholders (and translate their needs in to solutions) as well to the technical security specialists
152

Security Architect Resume Examples & Samples

  • Determine security requirements by evaluating business strategies and requirements; research information security standards; conduct system security and vulnerability analyses and risk assessments
  • Act in an advisory role in application development and acquisition to assess security requirements and controls and to ensure that security controls are implemented as planned
  • Research and recommend tools to help manage security analysis, process, and risk
  • Provide mentoring and technical leadership to the Information Security teams
  • Act as SME and provide third-level support and analysis during and after security incidents
  • Perform gap analysis across the organization to identify and document risk and to identify unnecessary complexity in existing processes and procedures; work with service and application owners on mitigation strategies
  • Develop and deliver security roadmaps to communicate security state and remediate or mitigate top risks across products and businesses
  • Conduct security reviews of application architectures to assess technical and business risk, identify threats and vulnerabilities, and propose solutions
  • Create and maintain security architecture guidance to be used by other architects, engineers, analysts and administrators
  • Document security architecture and advise product teams on security best practices
  • Work with software architects to develop and maintain threat models
  • Work with development teams to define and operationalize secure development practices
  • Perform security design and code reviews with development teams
  • Remediate complex security issues
  • Participate in security compliance audits as needed
  • Minimum 7 years of professional experience, with 5+ years of experience in information security and/or IT risk management
  • 5 + years of hands-on experience as a security practitioner, implementing a variety of solutions across multiple disciplines
  • 3+ years of experience architecting solutions with a concentrated focus on security, performance, scalability, and reliability
  • 2+ years experience performing network and application security penetration testing and/or threat assessments
  • CISSP, GIAC certification(s)
  • 2+ years programming/scripting experience – one or more of: C, C++, Java, Perl, PHP, Python, shell
153

Security Architect Resume Examples & Samples

  • Understand current security posture of applications including web and mobile specific for Visa's enterprise
  • Lead integration, automation, and functional enhancements around existing security tools and processes ensuring innovation and advancement strategies that keep pace in the areas of access control, security-in-depth, secure transaction processing, secure coding practices for web and mobile applications
  • Identify and analyze system and application level vulnerabilities to provide recommended counter measures or mitigating controls that reduce risk to an acceptable and manageable level
  • Provide accurate and timely reporting of architectural solutions, risk findings and propose remediation and mitigation options
  • Have a solid understanding of current compliance, regulatory and legal requirements relevant to the transaction processing industry such as PCI, HIPPA, SOX, and GLB
  • Be able to seek concurrence and buy-in from associates and senior
  • Manage risk through a shared vision with the business leaders. Consult with and provide advice to senior management and their organizations in the development, implementation, and administration of information security policies and procedures, and on the information security infrastructure and privacy (PCI) related issues
  • Research the viability of new security products solutions that might assist the ISO operational groups in optimizing security patching, vulnerability scanning, IDS monitoring, log review,access management
  • As a Subject Matter Expert, maintain a level of knowledge to qualify as an authority in the profession within and outside Visa
  • Independently formulate direction, design or oversight for the development of major company-wide programs or plans that have significant impact on the success of the organization
  • Degree Required & Years of Experience: B.S + 5/MS + 3 years or higher in Electrical Engineering or Computer Science or relevant field
  • Executive presence; highly effective communicator
  • Include strong knowledge of Secure Development Lifecycle methodologies, Agile based methodologies, middleware platforms, development platforms (Java and .NET etc.)
  • Have experience working on large scale cloud based services (including SaaS, PaaS, IaaS) and very understanding of security challenges involve in deploying Cloud Applications
  • Hands on SW development experience in C/Objective-C/C++/Swift/Java
  • Good if have experience if these solutions and technologies: Safenet, Vormetric, SPLUNK, Voltage, Thales, zTPF, zOS Crypto services, Containers like Dockers, Fortify, SIEM tools, Hadoop, Active Directory, PKI
154

IT Security Architect Resume Examples & Samples

  • Overall system security Design Authority for the security architecture of the system, working in conjunction with Global Technology architecture teams
  • Defining security organisational structure, security processes, security technical subsystems and components, implementation and integration within the overall wider systems integration projects
  • Presentation of security solution and designs to senior management
  • Working within Global Technology projects to develop and deliver the core security architecture. Ensuring that the organisation deliver these security requirements, within budget
  • Ensuring that technology risks are managed effectively and efficiently
  • Proven ability to lead and deliver security projects
  • Demonstrable experience of secure system design and implementation
  • Understanding of the principles of best practice security as embodied in NIST
  • Strong deductive reasoning, critical thinking, problem solving, and prioritisation skills
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, Network, Cloud security, Mobile device, threat detection analysis, or information risk management
  • Ability to deliver detailed process and procedure documentation
  • Excellent written and verbal communication and organisational skills
  • Understanding of network design principles with and knowledge of the OSI model
  • CISSP or SANS GIAC certification
  • Experience working on global teams across time zones, cultures, and languages
  • TOGAF Architecture Development
  • Threat Modelling
  • Application Security Controls (e.g. OWASP Top (10))
  • Authentication and Authorisation for both internal and cloud based architecture
  • SDLC methodologies (AGILE, Waterfall)
155

Security Architect Resume Examples & Samples

  • 7+ years of IT implementation experience
  • Significant technical experience in Cloud Computing technologies, scripting languages (JSON, Python, RoR, etc), integrating 3rd party monitoring tools, encryption tools and standard methodologies, and forensics
  • Experience with compliance & security standards across the enterprise IT landscape Deep understanding of enterprise risk management methods and techniques to drive successful outcomes in a multi-national environment
  • Experience with cloud computing technologies and workload transition challenges
  • Experience with archive, backup/recovery and business continuity processes in distributed operations
  • Computer Science or Math background preferred
  • Experience building enterprise security strategy for cloud adoption or driving the program's evolution to meet new requirements desired
  • Hands-on technical expertise in Security Architecture, automation, integration, and deployment (DevOps) desired
  • Familiarity with compliance & security standards across the enterprise IT landscape desired
  • Strong verbal and written communications skills and ability to lead effectively across organizations desired
156

Database Security Architect Resume Examples & Samples

  • Understanding of database security issues spanning relational, object oriented, NoSQL, and Big Data platforms
  • Understanding of or experience with data discovery tools
  • Knowledge of data security vulnerabilities, threats, exposures, as well as associated risk and mitigating solutions
  • Demonstrated experience in producing consumable reports or presentations for technical and leadership audiences
  • Strong analytical skills with the ability to parse requirements and relate them to appropriate security controls
157

Principal Enterprise Security Architect Resume Examples & Samples

  • Assesses the value of emerging technologies by conducting opportunity assessments and implementing proofs-of- concept
  • Collaborates on the development of the Information Security strategic plan
  • Develops and plans service processes that are aligned with company goals and strategies
  • Develops enterprise organizational models
  • Develops high level financial and business case models to assess technologies and assist in prioritization of the Information Technology portfolio
  • Develops strategies, road maps and business systems architectures for information technology and the business
  • Develops technical and modeling standards across Information Technology and the business
  • Facilitates business and systems decisions
  • Integrates business processes with supporting systems that provide end-to-end solutions
  • Leads all phases of enterprise architecture development in support of business objectives: defining scope, modeling systems, analyzing requirements and planning implementations
  • Provides coaching, direction and leadership support to team members in order to achieve partners, business and customer results
  • Provides functional expertise on projects; coordinating and facilitating requirements gathering
  • Researches and represents information technology within an applied business context
  • Supports the implementation of enterprise programs to enable business growth and strategic goals
  • Experience in a security related discipline such as cloud security, application security, retail technology, etc
  • Overall information technology experience
  • Security Systems or Secure application development experience
  • Designing and implementing new technology proof-of-concepts
  • Enterprise architecture experience
  • Functional and systems modeling
  • Working in a variety of technical environments
  • Development of enterprise and departmental strategic plans
  • Indirect management of people
  • Business process design and analysis
158

Security Architect Resume Examples & Samples

  • Act as an Advisor on technology solutions and IT processes in accordance established Cox Automotive (CAI) practices and industry best practices to the portfolio teams
  • Design secure frameworks for the Enterprise Risk & Security (ERS) team’s review
  • Proven experience with application security, firewalls, IPS, vulnerability assessment and mitigation, event collection and correlation, auditing, crypto, data loss prevention
  • Excellent verbal communication, organizational, presentation and planning skills
  • Experience translating business direction into required security controls and collaborating from SME to C-Level
  • BS/BA degree or equivalent experience is required
159

Security Architect Resume Examples & Samples

  • Oversees implementation and maturity of the Security Development Lifecycle (SDL)
  • Assists in directing and supporting the overall security framework for AirWatch applications
  • Contributes to the iterative development of application security requirements for all products
  • Conducts security reviews of mobile and web-based applications
  • Acts as a consultant to all teams and business units on application security
  • Performs static and dynamic code analysis and works with teams to triage and remediate findings
  • Responds to external requests and reports related to product security as part of the ‘Product Security Incident Response Team’ (PSIRT)
  • Guides the organization in security development training and best practices for software assurance
  • Leads hands-on working sessions to guide teams in threat modeling
  • Works closely with release management to review software security requirements prior to release
  • Assess, obtain, and deploy tools and software solutions to aid in SDL and security testing processes
160

Senior Web Security Architect Resume Examples & Samples

  • Provide technical leadership across the company, presenting a solid knowledge and expertise in the security practices addressing the various platforms, systems, and applications employed within the Visa stack
  • Be able to ensure that stakeholder communications are timely, clear and concise. This includes the necessary scope of inclusion/exclusion, rules of engagement, timeframes, regular periodic management checkpoints, success criteria and reporting
  • Research the viability of new security products solutions that might assist the ISO operational groups in optimizing security patching, vulnerability scanning, IDS monitoring, log review, access management
  • Be a good team player and able to make sound decisions, exercise insightful judgment and use seasoned judgment
  • Have experience of project planning/reporting and management concepts, methodologies, tools, standards and procedures
161

Senior Security Architect Resume Examples & Samples

  • You must have extensive experience working in IT security within the vertical, preferably with direct experience working in a relevant customer organization or partner
  • Experience in security operations, network security and Cloud security architecture is essential; Penetration Testing, Policy Development, or Content security highly desirable
  • A strong and demonstrable consultative background, preferably with direct experience working for a Consulting or Systems Integration company
  • Strong personal presence and commercial acumen, and extensive experience working executive
  • At least one Industry related certifications such as CCSP - Certified Cloud Security Professional, Certificate of Cloud Security Knowledge (CCSK), CISSP, CISM, CCIE Security or SANS highly desirable or attainable within the first 6 months
  • Excellent communication and presentation skills (verbal and written)
  • AWS or Azure
162

IT Security Architect Resume Examples & Samples

  • Will serve as oversight for the ISD solution to ensure that data and infrastructure security requirements are met
  • The senior security architect will identify and document the security requirements in accordance to requirements
  • 3 years of experience in security architecture
  • 5 years of experience in information security
  • 5 years of experience working with IT systems
  • 5 years of experience working with network software and hardware, data or voice
  • CISSP, CISA, PMP and/or Security+ certification
  • Expertise in Security Frameworks (including, but not limited to ISO, NIST, COBIT, and HIPAA/HITECH)
  • Excellent oral and written communication skills with clients and technical staff
163

Chief Security Architect Resume Examples & Samples

  • 15+ years’ experience in Information Security
  • Broad understanding of security functions such as Infrastructure Security, Identity Access Mgmt (IAM), Data Security, Cloud Security, IoT Security and Governance Risk & Compliance (GRC). Strong experience in Managed Security Services models for SIEM/Threat Intelligence/Vulnerability Mgmt services
  • Solid customer presentation skills and good CxO level connect
  • Good exposure to Healthcare and Pharma domain as well as their needs in digital security
164

Applications Security Architect, GBS Resume Examples & Samples

  • Conduct application security assessments, application security architecture reviews, and risk modeling for company-developed software, acquired and/or hosted applications and services
  • Provide direct support to business units as a subject matter expert for security defect resolution, including vulnerability remediation and/or mitigation
  • Work with the Operational Security Team to conduct internal and external assessments of deployed software applications and systems including system and network vulnerability scanning, penetration testing, and patch management
  • Develop an effective system to collect and report meaningful metrics from security issues identified in all reviews
  • Conduct hands-on technical security awareness training for software architects and development groups
  • Develop in conjunction with company's software architecture group, a set of architectural and development standards for all application security
  • Collaborate with applications developers and vendors to ensure legacy and newly deployed applications are developed securely
  • Evaluate outsourced / third-party technologies and hosting environments to ensure they provide adequate protection for the processing, transmission, and storage of company information
  • Research and review configurations, operating systems and applications for compliance with policy, industry standards and manufacturer recommended security baselines
  • Assist in the resolution of security incidents related to company assets, including root cause analysis
  • Verify security systems by developing and implementing test scripts
  • Possess strong knowledge of database security controls, including access control, auditing, and configuration best practices
  • Participate in emergency security response activities as required including the development of processes to capture or record security incidents and remediation steps to prevent such incidents in the future
  • Minimum 2 year hands-on experience with static and dynamic code analysis including the use of application security audit tools such as Vericode or CheckMarx or SecureAssist (others)
  • Practical experience working with front-end technologies such as: HTML5, CSS3, and/or Advanced JavaScript Frameworks e.g. AngularJS or JQuery
  • Practical experience in the design and development of secure .Net, Java and Apache-based applications and frameworks
  • 2-3 years direct experience working with cloud-based software solutions; strongly preferred, Azure, and/or AWS, etc
  • 2-3 years direct experience with vendor and managed security services management, enterprise wide transition and transformation programs
  • Direct experience with providing in-depth information security technical advisory and recommendations to external and/or internal clients relating to the technology services, security standards and policies and industry best practices
  • Experience in developing and implementing Enterprise IT security strategy, and compliance programs
  • 3 years hands-on experience in reviewing technology projects in a security, risk and security controls advisory role providing recommendation to address such risks and/or enhance the technical controls
  • Advanced expertise in Microsoft Office products - Word, Excel, PowerPoint, & SharePoint – demonstrated creativity in use of these products to solve analytical problems and large data manipulation on Excel
165

Security Architect Resume Examples & Samples

  • At least 4 years of experience as Engineer / Specialist, hands on practical knowledge
  • Pre-sales practitioner with proven background, working on large, complex engagements
  • SME knowledge of networking, cloud and infrastructure is a strong plus
  • Knowledge about outsourcing models and techniques
166

Principle Reference Security Architect Resume Examples & Samples

  • Leads enterprise reference architecture function; includes Applications, Integration, Data/Analytics, Continous Delivery, Infrastructure, End User Enablement and other technical areas
  • Develops vision, strategy and execution in alignment with Domain roadmap demand plans for reference architecture function
  • Works closely with Sr. Leadership Team, Domain/Business Architects and Platform Engineering to ensure strategy and execution alignment
  • Ensures NIKE Technology keeps up with latest technology industry trends, product and solutions
  • Indirectly leads team of Reference Architects
  • Work with Business IT teams to continually improve the security posture of their application portfolios
  • Aid in the development of a multi-year IT Security Strategy
  • Aid in the development of an annual Security roadmap outlining key initiatives in support of the Nike Information Security Strategy
  • Provide detailed input into the creation of the annual IT Security budget
  • Creation of a sustainable security framework to allow secure technology standardization
  • Develop business cases for the adoption of new technology, standards and processes
  • Work with peers throughout Nike Inc. to collect input on needed security capabilities
  • Gain understanding of the effectiveness of security policies and technologies
  • Provide guidance to engineering and support teams on security risks
  • Support management in understanding architectural information risk within/against Nike
  • Analyze market trends and adjust the strategic security roadmap accordingly
  • Continually update relevant security skills
  • Expert knowledge of information security standards, principles and practices
  • Demonstrated relevant security expertise in designing secure architectures for a mix of the following areas: Web Applications and Services / Server Operating Systems (Windows / Linux) Workstation Operating Systems (Windows / MacOS)/Mobile Device technology / Network Devices / Storage Devices / Virtualization / IDS Technologies / SIEM Technologies Secure Application Development / Encryption / PKI / Identity Management/Application Security / Database Security (Oracle/MySQL) Compliance - SOX, PCI, ISO 27001 Cloud / Colocation / SaaS technologies / Forensics / Cyber Intelligence/ National and International Privacy laws and regulations
  • This role must be proficient at the techniques that go into the formulation of architectures, including requirements discovery and analysis, application of abstraction, formulation of solution context, solution alternatives identification and assessment, technology selection, and architectural configuration
  • The ability to assess risk and translate it to business relevant considerations and facts
  • The ability to learn and apply new concepts quickly
  • Superior communication, ability to explain complex concepts in plain language and graphics
  • Excellent organization, and interpersonal skills with the ability to appropriately communicate and translate complex security risks to dollars
  • Requires a Bachelor's degree in computer science or related filed, or equivalent work experience
  • 10+ years in architect roles
  • 5+ years as lead architect
  • 10+ years in senior leadership roles
  • 15+ years in hands on security engineering (expert level in minimum two technical areas)
  • Proven track record of High-Profile communication written and verbal
  • Demonstration of strong influencing skills
  • Global Experience with solution delivery
167

Security Architect Resume Examples & Samples

  • Work with the Delivery Project Executive and delivery organization as a primary point of contact for client needs, requirements and expectations with regard to assigned IBM delivery team operations for Security Services
  • Manage Projects within Time ,Cost and Scope
  • Responsible for service quality, service delivery performance and drives service excellence in the Program. Is the owner of service delivery quality and is responsible for tracking and reporting service level attainment/objectives (SLAs/SLOs)
  • Work collaboratively with individuals/teams to achieve client satisfaction targets
  • Use technical knowledge and familiarity with client to identify new opportunities for growth
  • Responsible for defining and owning the Service/Quality Improvement plan
  • Ability to interact across all levels of organization
  • Proven ability to present to all levels of senior management
  • Microsoft Office Tools (Word, Excel, Visio, PowerPoint) - The ability to create high quality documentation such as Presentations, Risk Assessments, Reports and completing metrics and spreadsheets
  • Min. Bachelor's in Information Technology or equivalent industry experience
  • At least 10 -12 years’ experience in project management and operational experience in delivery of large, complex projects and Security programs
  • At least 7 years’ experience in managing Security element of projects and programs in a large organization
  • Possess Industry Professional Certification e.g. CISSP, CISA, CISM, CEH,CCNP)
168

Software Security Architect Resume Examples & Samples

  • Collaborate with the business to understand / influence security requirements
  • Demonstrate understanding of cross - functional / cross - domain requirements and impact
  • Maintain knowledge of current and emerging technologies / products / trends related to security architectural solutions
  • Ensure alignment of solutions with business and IT goals / objectives
  • Identify and quantify scope and impact of security policy changes on systems
  • Facilitate / lead / participate in identification of solution options and features
  • Communicate solution options to business owners / stakeholders (e.g. architecture reviews)
  • Incorporate security architecture (e.g. infrastructure, network, controls) into conceptual designs
  • Ensure alignment with enterprise technology standards (e.g. solution patterns, application frameworks, technology roadmaps, capital plans)
  • Identify gaps between established standards and proposed solutions, and follow the exception / waiver process as needed
  • Maintain awareness of current security technology assets and the capability of each
  • Understand and adhere to architecture Governance framework
  • Deliver all project deliverables on scope, on time and on budget
  • 2+ years of experience working as an architect (technical, data, solution)
  • 1+ years of software / solution / enterprise security architecture experience
  • 5+ years of full - lifecycle application development experience with multiple technologies
  • Demonstrated experience creating architectures in alignment with design patterns / reference architectures
  • Demonstrated experience creating architectures in alignment with corporate security policies and industry regulations
  • Familiarity with regulatory frameworks such as PCI or SOX
  • Working knowledge of ITIL, COBIT, and NIST 800 - 53 among other governance frameworks
  • Healthcare industry experience
  • Team leadership or team management experience
  • Experience prototyping and performance tuning applications deployed across multiple operating systems, languages and computing platforms
  • Agile development
  • Working knowledge of HIPAA and HITECH regulations
  • Demonstrated ability to influence opinion without direct managerial control
169

Security Architect Resume Examples & Samples

  • Experience with industry compliance and security standards including PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks
  • Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks
  • Implementation experience with enterprise governance, risk, and compliance software packages
  • Experience implementing security controls around ERP & business productivity packages including SAP, Oracle
  • BS level degree or equivalent experience required, computer science, business or math background preferred
  • Experience building enterprise governance, risk, and compliance programs or driving the program's evolution to meet new requirements
170

IT Security Architect Resume Examples & Samples

  • Ideally degree qualified or equivalent with a relevant Information Security qualification; CISSP, CISM or CISA preferred
  • Experience of writing high quality, fit for purpose Information Security architecture documents, policies, processes and standards
  • Expertise in Windows and IP intranet/internet security environments including firewalls, intrusion detection, incident response, vulnerability testing, operating system hardening, regulatory compliance and data classification
  • Expert knowledge and understanding of PCI DSS, ISO 27001, COBIT and ITIL frameworks
  • Demonstrated ability to successfully prioritise and deliver high quality, accurate work within tight deadlines; enthusiasm to embrace change and complexity
171

Security Architect Resume Examples & Samples

  • Provision of assessments of the business environment and the information risk associated with in-scope systems
  • Engage with the solution architects to identify information risks that arise from proposed architectural designs
  • Propose architectural designs and countermeasures that mitigate risk and align with business policy
  • Balance the cost of design countermeasures in line with information risk
  • Ensure the secure configuration of systems in line with design requirements
  • Work closely with solution architects and wider design teams to ensure that accreditation aspects are addressed
  • Within the RMADS
  • Support the development of the ISMS, with support from other security and service management personnel and work
  • To ISO 27001 certification
  • Engagement with the accreditor and other security stakeholders to assist with the development of RMADS and
  • Related support documentation (e.g. ISO 27001 Statement of Applicability, generic SyOps, any required Code of
  • Connection / Interconnection Security Policy development
  • Ensuring that the policy described in the RMADS is reflected in the security design and in the conformance
  • Testing support documentation
  • Ensure architectural design meets security policy and is an enabler of accreditation
  • Provide and manage an approach to the management of design requirement to support accreditation for legacysystems
  • In depth knowledge of HMG Policy, Practice and Design Architecture
  • In depth knowledge of Networks, Security Appliances etc
  • Good knowledge of IT Health Testing process and procedures
  • Eligible for SC and DV Clearance
172

Senior Software Security Architect Resume Examples & Samples

  • Provide technical and strategic guidance, related to the software development life cycle (SDLC), to globally distributed engineering and software development teams
  • Create governance, processes, tools, and technologies to ensure that products are of highest quality and security standards
  • Be responsible for leading and managing the implementation of SDLC for all business units (Mobile, Server, Client Workstations, and Cloud Software)
  • Create and implement strategies and plans to attack classes of potential security vulnerabilities against products in the manner of an unethical hacker (the ethical hacker role will recommend solutions as a defense strategy, and work with the development teams to ensure the proper changes are made to the products (remediation))
  • Be responsible for the direction, coordination, implementation, execution, control, and completion of specific projects, ensuring consistency with company strategy, commitments, and goals
  • Provide thought leadership in secure application development and information security
  • Provide analysis and assistance in the design of security solutions for embedded and software development
  • Support Product Security Incident Response teams to quickly and accurately assess software risk of vulnerabilities and provide technical guidance to development teams
  • Develop and contribute to information security standards, procedures, and guidelines across multiple platform and application environments
  • Identify and document product security risks and propose mitigating controls
  • Contribute to the implementation of the company secure development life cycle process
  • Provide vulnerability assessment reports to key stakeholders
  • Conduct continuous analysis of security thread information (viruses, malicious code, potential backdoors, industry events, hackers, zero-day exploits, original equipment manufacturer (OEM) weaknesses, IDS/IPS and security information and event management (SIEM) alerting, and potential problems with BIOS and firmware) to proactively assess and investigate emerging threads and potential impact on products
  • Assess the applicability of threat and vulnerability feeds, rate the risk, and communicate to the appropriate parties
  • Recommend corrective actions to mitigate security threats and risks to selected products
  • Communicate identified changes in threats and vulnerabilities based on trend analysis and concerns generated from customers and potential customers
  • Create reports to demonstrate assessment coverage and remediation effectiveness, and work with Product Engineers and software teams to ensure that corrective actions are implemented
  • Identify and develop new tools, tactics, and procedures for changing threat scenarios
  • Work directly with technical staff and leadership to promptly assess and implement mitigating controls to attach new vectors and changing threat landscape
  • Identify, evaluate, and communicate new and ongoing threats to senior management
  • Work with Software Designers, Developers, and Testers to review, assist, and recommend changes to functionality to address the security of company and third-party software
  • Broad knowledge of many aspects of information security, with experience in the following: corporate information security mitigation techniques such as firewalls, IDS/IPS, web application firewalls, authentication technologies, web filtering, proxy firewalls, network taps, and tap aggregators
  • Secure coding and development experience
  • Understanding of secure development fundamentals such as least privilege, attack surfaces, and coding practices (OWASP, SANS Top 25, threat modeling, and more)
  • Experience with vulnerability assessment processes and tools, and familiarity with tools such as Metasploit, Nmap, Nessus, Burp Suite, and Qualys
  • Expertise in securing fundamental networking protocols such as DNS, HTTP, HTPS, TCP, UDP, TLS, and IPSec
  • Experience securing Windows applications
  • Mid-level leadership skills
  • Ability to motivate and cultivate a collaborative work environment
  • Knowledge of the NIST and FIPS security publications and standards is highly desirable
  • Security-related certifications
173

Security Architect Resume Examples & Samples

  • Help drive execution on our vision and strategy
  • Assist in the design of a practical and efficient architecture for our security product line ensuring an adequate implementation architecture
  • Lead collaboration across different teams (hardware and software) on the development of security-related technologies, products and solutions
  • Provide technical leadership and mentoring
  • Maintain deep knowledge of industry and technology trends and standards in order to help identify new business opportunities
  • Research, develop and implement cutting edge POCs
  • Adopt, help evolve, and evangelize our security technology vision and strategy
  • Architect, design, and develop system architecture and software solutions
  • Extensive experience in C/C++ coding on Linux or Windows, algorithms and data structures
  • Proven track record of building systems from scratch
  • Excellent understanding of Operating Systems concepts and kernel components
  • Excellent understanding of virtualization and containerization technologies
  • Prior experience in the Security space including aspects of desktop and server security
  • Become a motivated product and industry influence by maintaining deep technical and business knowledge of various market segments and of best-of-breed security strategies
  • Ability and willingness to become a hands-on engineer as necessary
  • Extensive experience in systems software architecture and development of security related products
  • Strong opinions on software security and an ability to present/defend those opinions to both technical as well as non-technical audiences
  • Extensive experience creating, presenting, and refining clear, compelling technical specifications from top-level system architecture documents down to low-level implementation guides and test plans
  • Extensive experience working with open source tools
  • Experience with embedded platforms
  • Experience with hardware-based security mechanisms (TPM, TrustZone, Secure Boot, SGX, etc.)
  • Expertise in Cryptography fundamentals and Public Key Infrastructure
  • Ability to see and present "the big picture" and offer solutions to make it better
  • Must be effective in working both independently and in a team setting
  • Strong listening and question based analysis skills
  • Excellent communication skills, both written and oral are required
174

Security Architect Resume Examples & Samples

  • Establish An endpoint strategic security architecture vision, including standards, policies, and frameworks that align with the overall business strategy
  • Participate in solution architecture design; lead security efforts assisting with the integration and initial
  • Implementation of solutions and end user computing
  • Minimum of 7 years of hands-on technical information security experience
  • Experience designing and implementing security solutions Previous consulting or sales engineering experience is ideal
  • Bachelor’s degree in computer science or MIS
  • Master’s degree is ideal
  • CISSP or SANS GIAC certifications are ideal
175

Security Architect Resume Examples & Samples

  • Demonstrates ability to plan, organize and manage all phases of a project lifecycle to ensure successful delivery. This includes developing and managing project governance plans, project schedules, team goals and success criteria, project milestones, and budgets. Also includes ownership and responsibility to manage issues, risks, decisions and outcomes from their team’s tasks and activities, and the overall success of a project
  • A team player who effectively integrates, motivates and builds relationships with cross-functional team members (local or remote), sponsors, key stakeholders, executives, and other individuals or organizations involved with or affected by the project
  • Demonstrates the ability to understand the operating styles of others as well as team/client relationships, team dynamics, and adjusts behavior accordingly to succeed. Recognizes environmental or cultural nuances and adapts
  • Ability to challenge, recommend and redirect teams as well as client expectations as necessary for successful program and project delivery
  • Actively looks for ways to improve process efficiencies and effectiveness
  • Takes proactive steps to ensure teams meet or exceed customer expectations
  • Ability to demonstrate experience to successfully manage two or more concurrent projects/customers
  • Experience leveraging formal project management and development methodologies on an enterprise level engagement
  • Has managed projects using Waterfall, Iterative and Agile methodologies
  • Possesses a deep knowledge of project management best practices and how to apply them in an effective yet pragmatic way across large, complex projects
  • A history of increasing leadership responsibility and career growth in project management
  • Outstanding written and verbal communication skills with team members and audiences of all levels. Plans and oversees the preparation and dissemination of project communications
  • Competency in Microsoft Office suite, Microsoft Project toolsets and source code management products
  • 5+ years Project Management / Engagement Management consulting experience managing enterprise level IT projects across multiple industries
  • Proven success in working with teams and executive leadership in a complex, large-Company environment
  • Minimum leadership experience managing technical projects consisting of 5 to 12 people totaling over $500,000 budget
  • Ability to take ownership, work under pressure and meet deadlines on time
  • Team player willing to work in an international environment and be part of a global team
  • Proven experience working in a matrix environment, managing multiple stakeholders
  • Works effectively in a dynamic environment with changing priorities
  • Ability to apply strategic thinking and demonstrate understanding of requirements to execute
  • Ability to make decisions guided by policies, procedures and business plan with limited guidance
  • Results-oriented, prioritizes work activities, plans and stays organized in order to meet commitments
  • Excellent presentation, communication (oral & written), and relationship building skills, across all levels of management
  • Negotiation and issue resolution capabilities
  • Business financial and business case development acumen
  • Understanding of technology principles and services including infrastructure, business applications, data management, security, application platforms and consumer facing technology
  • Excellent people management skills, including the ability to influence, negotiate and achieve results through others who are not direct reports
  • PMP Certification a plus
  • Scrum Master Certification a plus
176

Principal Enterprise Security Architect Resume Examples & Samples

  • To understand the business strategies and needs and developing security technology architecture to enable them securely
  • Analyze current technology environment to identify deficiencies and recommending solutions, as well as staying abreast of emerging security technologies and trends and apply them where appropriate
  • Create compelling presentations to articulate the technical strategies, architecture and roadmaps to various levels in the Organization
  • Work with Information Security group to define the strategies and principles that guide technology decisions and tradeoffs for the enterprise
  • Consult on technical architecture implementation activities with all stakeholders and Solution Owners to ensure alignment
  • Oversee and work with Engineering on the evaluation and selection of security related technologies and products. Also, work with Engineering to define and create the standards and implementation patterns
  • Identify the organizational impact and financial impact of the security enforcement solutions
177

IT Security Architect Resume Examples & Samples

  • Bachelor's degree, preferably in Infrastructure Assurance, Information Systems, or Computer Science
  • 4+ years experience in the field of IT Security, Information Assurance or IT Auditing
  • Experience with security policy development and documentation
  • Ability to communicate with employees and outside vendors
  • Proficient in Microsoft computer applications, to include MS Visio, and Access
178

Security Architect Resume Examples & Samples

  • Communicate and advocate security based guidance and best practices for Cerner development teams
  • Develop security reference architectures and artifacts which enforce architectural consistency across solutions implementation
  • Demonstrated ability to manage technical risks and drive future direction; keep up-to-date on current security trends and learn and understand industry security practices
  • Demonstrated ability to influence peer architects to improve its security, efficiency and scale over time
  • Advanced planning/organizational, problem-solving, analytical, time management, decision-making, and communication skills
  • Proficiency in cryptography, including Certificate architecture and implementation
  • Knowledge of web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols
  • Technical knowledge of techniques, standards and capabilities for vulnerability management, authentication and authorization, and Access and Identity Management
  • Previous leadership experience in Security
  • Experience in building systems to comply with HIPAA, Meaningful Use, DEA EPCS, and other EHR regulations
  • Bachelor’s Degree (or the equivalent industry experience) in CIS, MIS, IS, Comp Science, Engineering, Business Administration with emphasis in information systems, or related field and 5 years progressively more responsible related experience; or Master’s Degree (or the equivalent industry experience) in CIS, MIS, IS, Comp Science, Engineering, Business Administration with emphasis in information systems, or related field and 3 years related experience
  • Experience developing in C++, Java, or other OO programming technologies
  • Experience with the Scrum agile development methodology
  • Must be currently residing or willing to relocate to the Kansas City, MO metro area
  • 2+ years software development experience as an IT Security Architect or similar role
  • Architect Certification(s)
179

Security Architect Resume Examples & Samples

  • Contributes to the security incident response management
  • Provides support for the vulnerability management program
  • Analyzes information security trends and identifies patterns to focus present and future department efforts in addressing threats to U.S. Steel
  • Administers, monitors and responds to security related hardware and software problems utilizing a variety of testing tools and techniques
  • Evaluates information security risks associated with software applications and equipment, and provides recommendations on effective security risk management
  • Bachelor’s degree in computer science, information technology or a closely related field
  • Ability and willingness to travel overnight to plant locations as needed
180

Security Architect Resume Examples & Samples

  • Manage security product rollouts to UTC and Business Unit computing environments
  • Document and maintain management controls, narratives and test scripts
  • Working with project teams to ensure secure implementations
  • Support IT Architecture team reviews of new technologies
  • Define key metrics to demonstrate program success
181

Senior Security Architect Resume Examples & Samples

  • Active Directory Domain Services (AD DS)
  • DNS and related technologies
  • Migration knowledge from Microsoft and non-Microsoft messaging systems is a plus
  • Microsoft Office Communications Server 2007 is a plus
  • Microsoft Lync / Skype for Business server experience is a plus
  • EMS (Enterprise Mobility Suite) knowledge is a plus
182

Security Architect Resume Examples & Samples

  • Assist Program Architects with interpretation of the ISM and other security controls in the context of the solution
  • Influence the shaping of Project Solution Architectures to take into account security concerns
  • Assist in identification of security risks and mitigation controls by performing security risk assessment
  • Run Security Working group with Defence security stakeholders
  • Create and maintain security views in Architectural documentation
  • Work with project and support teams to maintain security related standard operating procedures, such as Certificate and Key Management Guide
  • Assist in assessment of identified vulnerabilities (via security bulletins) for the Program
183

IT Security Architect Resume Examples & Samples

  • Develop strategies and plans to achieve security requirements and address identified risks
  • Monitor and report on compliance with security policies, as well as the enforcement of policies within the IT department
  • Work with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments
  • Work with IT leadership and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program
  • Manage the process of gathering, analyzing and assessing the current and future threat landscape, as well as providing the IT leadership with a realistic overview of risks and threats in the enterprise environment
  • Provide support and guidance for legal and regulatory compliance efforts, including audit support and assist with the resolution of negative audit findings reported by internal and external auditors
  • Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; work with IT management to align existing technical installed base and skills with future architectural requirements
  • Provide security communication, awareness and training for audiences, which may range from senior leaders to field staff
  • Assist in the development of security architecture and security policies, principles and standards
  • Develop a strong working relationship with the infrastructure teams to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements
  • Manage production issues and incidents, and participate in problem and change management forums
  • Play an advisory role in application development or acquisition projects, to assess security requirements and controls and ensure that security controls are implemented as planned
  • Collaborate on critical IT projects to ensure that security issues are addressed throughout the project life cycle
  • Coordinate, measure, and report on the technical aspects of security management
  • Miscellaneous activities and responsibilities as assigned by manager
  • Bachelor's Degree and 5 or more years of experience information Security with focus specifically on Security Architecture, Security Operations, Cryptography, Network Security or Security Forensics
  • High School Diploma/GED and 10 or more years of experience information Security with focus specifically on Security Architecture, Security Operations, Cryptography, Network Security or Security Forensics
  • Master's Degree and10 or more years of experience information Security with focus specifically on Security Architecture, Security Operations, Cryptography, Network Security or Security Forensics
  • Knowledge of mainstream operating systems (for example, Microsoft Windows and AIX UNIX) and a wide range of security technologies, such as network security appliances, identity and access management systems, anti-malware solutions, automated policy compliance and desktop security tools
  • Knowledge of network infrastructure, including routers, switches, firewalls and associated network protocols and concepts. Knowledge of developing, documenting and maintaining security policies, processes, procedures and standards
  • Knowledge of application technology security testing (white box, black box and code review), Peripheral Component Interconnect (PCI), Sarbanes-Oxley (SOX), and Customs-Trade Partnership Against Terrorism (C-TPAT) regulations
  • Skill with various tools and techniques, including risk, business impact, control and vulnerability assessments, used to identify business needs and determine control requirements. Strong analytical skills
  • Knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls. Knowledge of Railroad industry
  • Ability to analyze security requirements and relate them to appropriate security controls
  • Strong customer/client focus, with the ability to manage expectations appropriately, provide a superior customer/client experience and build long-term relationships Ability to prioritize work efforts and balance operational tasks with long-term strategic security efforts
  • Ability to work with business units/organizations and external vendors to ensure that service levels and vendor obligations are met Ability to develop, document and maintain security policies, processes, procedures and standards
  • Strong leadership abilities, with the capability to develop and guide IT team members and to work with only minimal supervision
184

Security Architect Resume Examples & Samples

  • Develop proposals, documentation and presentations along with generating intellectual property, architectural specifications, and technical material
  • Collaborate with customer to understand security requirements and drive agreement and implementation with the engineering team
  • Establish a security culture within the organization by training and mentoring Manage the entire software security product life cycle, from inception to implementation Responsibilities include threat assessment, vulnerability assessment
  • Ensure products conform to standards and specifications
  • Maintain substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literature and conferences
  • BS in Computer Science, Computer Engineering or Electrical Engineering with over 10+ years relevant experience. MS in Computer Science, Computer Engineering or Electrical Engineering with over 7+ years relevant experience
  • Excellent understanding of security issues, concerns and security solution principles
  • Diverse understanding of an array of platforms client, server, mobile, and IoT for architecture and security topics
  • Proven experience in leading architecture and design of large and complex solutions
  • Hands on experience in hardware or software implementation is a plus
  • Excellent influencing and partner skills
  • Team work and coordination across groups is critical for success
  • A track record of successfully delivering results in complex delivery environment
  • A detailed understanding of a breadth of security solutions, overall security concerns, and solution architectures
  • Excellent verbal and written communications skills in English. German is desired
185

Senior Security Architect Resume Examples & Samples

  • Integrate large scale distributed financial services application leveraging IaaS based infrastructure with the required security controls
  • Identify the protection needs (i.e., security requirements and controls) for the information system(s) and network(s), document requirements and drive implementation through collaboration with developers and infrastructure engineers
  • Coordinate with systems architects and developers to provide guidance in the development and integration of secure cloud-based designs leveraging a combination of native IaaS capabilities and additional products where requirements dictate
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials)
  • Specify product requirements gathering, manage vendor relationships and perform POCs of selected products obtaining management buy-in to products that meet CSS business needs
  • Specify solutions that address authentication, authorization, logging of critical security related events, administration (provisioning of access rights, recertification of access rights), confidentiality (both at rest and in transit), integrity, and availability
  • Build effective relationships with key stakeholders who own and support IT architecture, infrastructure, applications, processes and operations throughout CSS
186

Security Architect Resume Examples & Samples

  • Serve as the custodian of the component architecture across the Site Portfolio; collaborates with peer, component architects to form the Core Infrastructure Architecture Team responsible for site architecture compliance and operational excellence across all sites in the Site Portfolio
  • Supports Enterprise Transformation, Leads the design, build and release of component Infrastructure at target Landing Zones (LZs, internal or Public Cloud)
  • Supports Enterprise Transformation, ensures all component architecture is securely removed from the old site in accordance with company policy
  • Ensure Infrastructure Solution Design and Deployments are in compliance with Enterprise Architecture Standards across all sites. Follows defined governance processes for Exception Approval
  • Ensure Operational Excellence through consistently achieved standard operating procedures, Service Level Objectives (SLOs) and, where externally provided services, Service Level Agreements (SLAs) across all sites
  • Orchestrates the resolution of site performance issues, Architecture and Operations; including, Major Incident Management, Findings from Root Cause Analysis and persistent under performance of the Infrastructure discovered via routine reporting and analysis
  • Participants and Approves all Changes to the site Infrastructure via Change Management procedures. Infrastructure Changes across all sites must be approved by the EITL)
  • 10 years of progressive experience including at least five in a Lead or Senior Security Architect role in a large scale, multi-business unit organization
  • Experience must include large scale Infrastructure Transformation (server and data center consolidation) including project management oversight
  • Technical and project management experience must be combined with strong business acumen and deep level of commitment to basic customer service (sense of urgency, rapid response, timely closure, tenacity toward problem resolution)
  • Candidates will have experience with and understanding of ITIL, SDLC and Project Management best practices
  • Strong communications skills, written and verbal; must be confident with and capable of executive and direct client level communications
  • Experience with public or private cloud as an architecture and delivery model preferred but not required
187

Security Architect Resume Examples & Samples

  • Security Architecture- Understanding multiple security Designs(SIEM, Firewall, Symantec) and cryptography- understand what they do and why they are there- CISSP- 1-2 years of Security Architecture experience
  • 5+ Years of working as an Individual Contributor within an Architecture team making advisement on Architectural Designs
  • 100% security advisement for SDLC designs and Infrastructure designs
188

Security Architect Resume Examples & Samples

  • The position is for a “Palo Alto Security Architect”. This is to be a person dedicated to this project
  • Should be effective with customer-facing and set and manage expectations with client stake-holders and team members
  • Demonstrated ability to make and take responsibility for decisions on major technical issues
  • Thorough knowledge and experience with security standards (Security architecture analysis, Security Administration and Network and Palo Alto/CISCO Firewall Engineering)
  • Excellent communication and presentation skills with the ability to present to a variety of external audiences, including being able to interact with senior executives
  • Excellent written communication
  • Resilience and ability to handle stressful situations effectively while managing several tasks
  • Communicate with the client regarding pertinent information security issues and provide periodic security posture updates
  • Architect complex IT hosting solutions by providing security subject-matter expertise in a consultative manner
  • Experience with reading and interpreting Level 2 and Level 3 networking diagrams
  • Ability to work within a defined change management process and willingness to participate in periodic after-hours scheduled maintenance
  • Ability to work in a self-directed manner and demonstrate initiative
  • Familiarity with scripting, ability to review and analyze security events and alerts and provide customer with a high level summary of any ongoing or potential threats across the following
189

Security Architect Resume Examples & Samples

  • At least 5 years experience in a role performing as a security consultant and/or architect
  • 8 plus years of experience in delivering & developing security solutions across MSSP, Identity & Access Management, Data Loss Prevention (DLP) & End Point Security, Security Strategy & Assessments etc. (Technologies: IBM Security, Oracle, CA etc.)
  • 8 plus years of experience in working with consulting & systems Integration methods
  • 8 plus years of experience in performing in a role as a security consultant or architect
  • Master's Degree in Business/Management or Engineering
  • Professional Certifications in the following: CISSP, CISA, CISM, CEH
  • Product Certification eg. IBM IAM suite of products and/or 3rd party
190

Security Architect Resume Examples & Samples

  • You’ll be motivated and passionate about your subject
  • Have the ability to identify and assess complex risks and controls, to relate them to the wider business environment and to express opinions clearly
  • Possess excellent communication skills (both written and verbal) and interpersonal skills
  • Have the ability to present on specific subjects to a group of people (technical and non-technical)
  • Have the ability to develop strong working relationships
  • Have an understanding of threat modelling
191

IT Security Architect Resume Examples & Samples

  • Evaluates middleware (Websphere, JBoss) and server specifications, input / output processes, and working parameters for hardware / software security standards
  • Integrating monitoring tools like Dynatrace or New Relic with existing infrastructure
  • Analyze all aspects of the existing infrastructure and recommends modifications that will enhance system reliability, security, serviceability and scalability
  • Work with teammates, clients and other teams to identify and resolve security standards
  • Evaluate new tools and infrastructure designs in order to recommend modifications
  • Provide in depth consultation to application teams on security and certificate maintenance
  • Assist in defining standards, guidelines, best practices and metrics
  • Participates in the development of business strategy
  • Develops and manages business plans to achieve objectives
  • Leads large, complex projects to achieve key business objectives
  • Solves unique and complex problems with broad impact on the business
  • 4+ years working with J2EE middleware or applications
  • Experience with certificate management of applications and interconnected components
  • Experience with troubleshooting and resolving issues in middleware environments
  • Experience automating and documenting standard support processes
  • Ability to participate in a 24 / 7 on call rotation
192

Security Architect Resume Examples & Samples

  • Ability to analyze Layer-2 and Layer-3 networks, firewalls, proxies, ports and protocols, etc. for security configuration compliance
  • Knowledge and experience with C&A processes in DoD environments, preferably with experience using Risk Management Framework (RMF), and demonstrated completion of C&A tasks required to achieve ATO for complex systems or networks
  • Ability develop risk assessments, analyze and evaluate complete networks using a variety of security tools
  • Experience with securing network virtualization technologies used to consolidate network control functions from hardware devices a virtualized control node or console
  • Familiarity with a with variety network routing and switching equipment devices from multiple vendors
193

Senior Security Architect Resume Examples & Samples

  • Contribute to the architecture and delivery of an identity management repository (LDAP), including schema and organizational/role structures
  • Contribute to the architecture and delivery of a privileged account management (PAM) system to manage and delegate elevated privilege
  • Contribute to the architecture and delivery of a strong multi factor authentication solution
  • Develop tactical and strategic solutions to enable “identity management” processes
  • Define and document the structure, connections and relationships of the various identity management solutions in the context of comprehensive identity management
  • Work with the clients Enterprise Architecture and Enterprise Security groups to apply standard, guidelines and policies within the program
  • Participate in all phases of the development methodology cycle to implement the required information technology, adding technical know-how, creativity and a seasoned perspective to initiatives and teams
  • Analyze business context (trends and business strategy) to derive the architecture in support of the solution
  • Translate architectural decisions into high-level designs; review and develop artifacts for alignment with the overall architecture
  • University Degree in computer science, computer engineering, electrical engineering or related discipline, or equivalent experience
  • A minimum of ten years of relevant work in the IT field
  • Minimum of five years of experience in developing identity architectures including LDAP/Kerberos/Radius/SAML/etc
  • A strong understanding of NIST/ITSG or equivalent security control framework
  • A strong understanding of data security and risk management principles
  • Understanding of multi factor authentication solutions such as RSA
194

Security Architect Resume Examples & Samples

  • Strategic Visioning: Develop Security Standards and Reference Architectures to ensure adequate security controls throughout CME Groups systems and technologies. Participate in the development of the security road-map, and communicate securities vision to business partners and IT staff
  • Technical Leadership: Provide security leadership to infrastructure and development teams to deliver major projects & programs. Utilizing extensive knowledge of multiple technologies and platforms, provide secure technical design recommendations based on long-term Security and IT organizational strategy and the evolution of security technology
  • Mentoring: Takes responsibility for personal and project team security, technical and professional growth. Serves as a technical resource providing guidance and advice to project team members on security, technology and designing effective solutions. Provides technical assistance and follow through to team members on complex problems. Review design and development work, instructing team members as needed
  • Analysis/Design: Analyze high level requirements and apply knowledge of business needs and security architecture to determine appropriate course of action. Plan, design, and drive delivery for technologies that reduce costs and improve overall security posture within the organization
  • Business Knowledge: Assist the Enterprise Architects in defining high level security requirements. Refine ability to combine knowledge of business environment with the architecture of secure solutions. Bridge the current secure technical capabilities with the business strategy of the organization. Evaluate possible implementation of new technology, consistent with the goal of improving existing security posture and in meeting the needs of the business
  • Technology Knowledge: Maintain a strong knowledge of Security, IT systems and architectures. Research, collect and disseminate information on emerging security technologies and key learning throughout the organization
  • Communication: Provides input to peers, management and customers for recommendations and alternate security solutions and/or improvements. Conveys and insures the understanding of security strategies and vision to project participants. Conveys problems, solutions, updates and project status to their peers, customers and management. Researches and presents detailed information for cost justification of new purchases to management. Develops and reviews program, systems, user, operations and disaster recovery documentation. Provides feedback on team and individual performance against established assignments. Participates in hiring process, conducts technical interviews, contributes to overall evaluation of candidates and makes recommendations for hiring
  • 5-10 years of infrastructure/systems/application security analysis and design OR demonstrated ability to meet job requirements through a comparable number of years of technical work experience
  • Experience with drafting of Standard, Reference Architecture, and Implementation Guidance
  • Previous experience and proven ability to define infrastructure/systems/application architectures is preferred with In-depth knowledge of network protocols, firewall and network architecture, secure software design, Microsoft Windows and Unix/Linux OS, database architecture
  • Must have strong understanding of the architecture design process, methodology, and a high level of understanding of business environment, strategy and need
  • High degree of understanding in the theories, methodologies and principals underlying secure technical analysis, design and implementation of software applications, systems, and/or databases
  • Proven expert analytical and design skills at multi-product/multi-environment levels as well as an in-depth experience in research and analysis, project planning and implementation
  • Aware of business issues as they impact overall project plans. Recognized reference and central point for security and technical issues across groups and products. Strong communications and interpersonal skills
  • Must have strong knowledge of job specific technical skills specified in the requisition and be able to apply them to specific software and/or database development efforts
  • Candidates must have proven ability to build value propositions, business cases, & drive results as part of a larger project or program team
  • One or more certifications such as CISSP, CISA, GIAC, GSEC, EnCE
  • Experience in financial industry and/or trade industry
  • Amazon Web Services
  • Linux/Windows Security
  • OWASP
  • *THIS IS A 2-3 MONTH CONSULTING OPPORTUNITY ONLY***
195

IAM Security Architect Resume Examples & Samples

  • Provide Expert access troubleshooting and production support as needed in all systems across the enterprise especially related to Active Directory, IAM, Privileged ID Management, and SAML technologies
  • Identify and lead large and complex Continuous Improvement projects seeking opportunities to more effectively address team processes and customer needs. Guide team members on less complex Continuous Improvement Opportunities
  • Demonstrates an advanced understanding of troubleshooting and configuring Drivers, Privileged ID Management, and SAML SSO integrations
  • Has an advanced understanding of enterprise workflows enabling them to perform advanced troubleshooting and create advanced workflows
  • Lead large projects, manage and train team members assigned to projects, with little to no direction
  • Coaching and serving as a technical escalation resource to team members and groups in or outside the department on all Identity Access related technical issues
  • Understanding of Cloud solution best practices and integration techniques
  • Researches, evaluates, designs, tests, recommends and plans the implementation of new or updated information security technologies
  • Lead security project implementation from conception, design, testing and implementation
  • 7+ years of experience or training in Identity systems security fundamentals design, implementation and troubleshooting across all computer platforms
  • 7 or more years required of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments
  • Experience in implementation and management of security access systems within the enterprise and in the cloud (e.g. Federation, SAML, etc.)
  • Demonstrates an expert understanding of how security access systems integrate across the enterprise
  • Knowledge and ability to teach/mentor an Engineer II provides regular knowledge transfer to team members
  • Experienced in leading large security access system upgrades/projects
  • Ability to add/change and provision roles and tasks in an IAM environment via standard business applications
  • Demonstrates an advanced understanding of how an IDA system integrates with SAP
  • Experience writing, executing and troubleshooting advanced Power shell scripts
  • Has an advanced understanding of an IAM environment and related technologies, including Active Directory and SAP
  • Ability to troubleshoot user account and directory object issues throughout the IAM environment including Privileged ID Management, Active directory, and SAML environment
  • Demonstrates an advanced understanding of troubleshooting and configuring the IAM landscape including Privileged ID Management and SAMIL SSO integrations
  • Has an advanced understanding of enterprise workflows enabling them to perform basic troubleshooting and create basic workflows
  • Very strong analytical and problem-solving skills
196

Security Architect Resume Examples & Samples

  • Azure Cloud Services (Microsoft)
  • Knowledge of compliance and regulatory program requirements, such as PCI, ISO 27000, NIST, FISMA, and SOC standards
  • Excellent written communication skills, demonstrating the ability to write with purpose, clarity, and accuracy to both technical and non-technical audiences
197

Chief Security Architect Resume Examples & Samples

  • Promote secure design and provide practical, effective security guidance to Intuit businesses
  • Lead the security technology evolution and strategy
  • Drive end-to-end architecture across security product offerings
  • Lead the execution of critical architectural priorities for senior technology leaders to develop secure products
  • Work with key stakeholders in multiple engineering groups to drive near and long term architecture decisions
  • Be a key contributor to ensure the product is highly secure, avalailable, scaleable, and resilient
  • Inspire innovation and deliver quality at speed across offerings and platform
  • Execute to success through diligent planning, attention to detail, effective delegation, efficient decision making, and individual/team accountability
  • Influence cross-organizational leaders that can drive success for the individual development teams
  • Communicate effectively across multiple organizations to ensure that the teams are completely aligned to the objectives and can do the job effectively
  • Build strong inter-personal relationships with peers and other key stakeholders that can help smooth execution
  • Computer Science degree with 15+ years of experience in the software product security industry in senior architecture and software development roles
  • Demonstrated experience in senior leadership positions with responsibility for architecture and technology for Intuit’s customers
  • Demonstrated experience in setting clear technological / architectural context for the business unit leadership and provide key contributions to the design context
  • A laser focus on outstanding business outcomes with effective and fast decision making that takes into account the interests of all four key stakeholders – employees, customers,shareholders, and partners
  • Experience in making successful tradeoffs that balance the short and long term security goals
  • Experience driving engineering design using and Agile process to drive innovation, accelerate decisions and outcomes while minimizing risk
  • Proven ability to lead and influence large distributed product development efforts
  • Partner with senior engineering leaders and business leaders to influence organizational and structural change
  • Experience using data insights for product refinement
  • Experience transitioning a monolith to a Cloud-based, service-oriented architecture
  • Ability to work well through ambiguity, confidence in making tough calls and leading through adversity with a sharp focus on the eventual right outcomes
  • Arbitrates technical disagreements across teams
  • Partner with the senior engineering leaders, Directors to build strong engineering teams
198

Security Architect Resume Examples & Samples

  • Assist with shaping the firm’s overall security architecture, strategy, policies and procedures
  • Risk assessments for existing and new business lines
  • Creating efficiencies around logging, correlation, auditing and compliance reporting capabilities
  • Key member of the firm’s cyber incident response team
  • Network forensics and malware analysis
  • Architect and implement various security technologies to support the overall security architecture. These include but are not limited to
199

Senior Security Architect Resume Examples & Samples

  • Develop a BCE wide communication plan for security architecture
  • Minimum of 8 years Information Security, minimum of 5 years IT or Networking and minimum of 3 years Architecture
  • Knowledge of ISO 2700x, ITIL, TOGAF, PCI-DSS, AGILE methodology and Software Defined Networks
  • CSM Certification
200

Security Architect Resume Examples & Samples

  • Responsible to manage Encryption at rest , Encryption in transit and Encryption in back-up
  • Manage Security architectures
  • Managing authentication for Users and Roles
  • Work with platform individuals
  • Overall experience of 10 years
  • 5 years’ Experience in managing encryption activities
  • 3 years’ experience in working in Healthcare projects handling PHI data
  • Experience in managing security architecture and authentications
  • MongoDB , Oracle, cloudera knowledge
201

Security Architect Resume Examples & Samples

  • Specialist subject matter expertise in Security architecture
  • Familiarity with TOGAF, ITIL and a formal project management methodology
  • Developing and Governing IT Strategies & Architectures
202

Security Architect Resume Examples & Samples

  • Security Architect - on an implementation project responsible for defining the end-to-end security architecture; this includes the Conceptual, Logical and Implementation Architecture views Security Assurance - with responsibilities for the assurance and governance of security across major transformation programmes or IT implementation projects
  • Risk assessment and mitigation planning - understanding the critical information assets for a client organisation, assessing and explaining internal and cyber risks, prioritising remediation actions and defining an improvement programme
  • Security solution design and development - leading teams of architects and developers to deliver leading edge solutions in identity management, network and infrastructure protection, security monitoring, information compartmentalisation etc., to defend against some of the most advanced threats and capable threat actors
203

IT Security Architect Resume Examples & Samples

  • 8+ years of relevant work experience, including hands-on technical advisory and coding skills, and proven ability to contribute at both strategic and operational levels
  • Bachelor's in Computer Science or Engineering with an emphasis in Information Security or a related field, or equivalent experience
  • Certification and/or Expert experience in a major operating system
  • Knowledgeable in security trends, products, and tooling
204

Senior Security Architect Resume Examples & Samples

  • Participates in management of Enterprise Single Sign On
  • The candidate should also have a strong understanding of TCP/IP networking, and should have a complete understanding of common Internet technologies such as ESSO, MFA, DNS, DHCP, HTTP, FTP, SMTP, SSL and SSH
  • Optimally candidate will understand common database technologies, ODBC, API concepts, basic SQL queries
  • Experience designing and implementing security policies and infrastructure in a multi-tenant cloud computing or data center environment
  • Technical proficiency in security-related hardware and software, including demonstrated ability in firewall implementation and management, network monitoring tools and intrusion detection, VPN systems, authentication, secure email, encryption technology, DLP and PKI required
  • Experience in developing and security strategy and key security programs (vulnerability management, event monitoring, security hardening, product security assessments, red team testing, compliance assessments, risk assessments, data security assessments, penetration testing, reviews of key platforms/networks/applications)
  • Experience in new computing architectures and implementation of networked computing systems; strong knowledge of business environment, IT infrastructure, and network operations preferred
  • Demonstrated confidence and leadership as a member of project teams in a cross-functional environment
  • Experience protecting aspects of an e-commerce web presence
  • Impeccable presentation and communication skills
  • All candidates must have excellent diagnostic abilities and demonstrated multi-tasking and independent problem solving skills
  • 4+ years of progressive experience in a combination of risk management, information security and IT jobs with five years of experience leading projects or acting in a leadership role
  • Advanced technical expertise with the ability to analyze traffic to determine possible attacks to the AMAG environment
  • 4+ years of progressive experience in cloud security/SaaS technologies including ISSO, ESSO, 2FA/MFA and Certificate based authentication
  • Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA), preferred. May substitute an equivalent combination of education and experience
  • In depth knowledge of security standards, assessments and risk frameworks such as ISO/IEC 27001/2, NIST Cloud Security Alliance (CSA), PCI, STIGS, CIS Benchmarks etc
205

Security Architect Resume Examples & Samples

  • Deliver security solutions and services to our clients including but not limited to security assessments, encryption, network security, endpoint security, and data loss prevention
  • Executes onsite and remote IT security projects and services adhering to PCMs Professional Services process and quality standards
  • Provides post-sales updates and reports detailing project deliverable status including challenges and other opportunities to meet customer’s business requirements
206

Chief Security Architect Resume Examples & Samples

  • Support adoption of proven security techniques for use within IoT
  • Help to communicate and establish new patterns for IoT security
  • Remain informed/knowledgeable about the evolving IoT security domain
  • Day to day operational help with Pen Tests, Gap Analysis and various security initiatives
  • Provide subject matter expert (SME) support to internal product development teams and external third-party vendor security assessments
  • Help to identify and fix issues of concern during product and services development via effective collaboration with multiple teams
  • Help to evaluate strengths and vulnerabilities of security feature(s)/solution(s)
  • Provide technical consulting to internal customers
  • Continue to upgrade technical and personal skills through internal and external training
  • Bachelor's Degree in Computer Science, Engineering or a related technical discipline, or the equivalent combination of education, technical training, or work/military experience
  • Generally requires 5+ years of related experience
  • Technical foundation and/or strong interest in systems security and network security. Experience with pen testing, security scanning, and threat modeling are very desirable
  • Ability to develop creative technology solutions to business problems
  • Demonstrable experience with open interoperable technical standards (e.g. SAML, OpenID Connect) used for federated authentication, multi-party federation metadata management, and identity assurance
  • Awareness of federal encryption standards and industry requirements such as HIPAA
  • Demonstrable expertise designing service interfaces (preferably REST APIs) and applying technical security standards (e.g. OAuth, UMA) to enable and protect API access while meeting enterprise architecture, security, and privacy needs
  • Experience with IAM requirements for cloud-based services, including strategies, trust models, and open standards (e.g. OAuth, SCIM), encryption, etc. used to improve manageability, access governance, provisioning, information security, and privacy
  • At least one industry security certification (CISSP, CISA, etc.) is desirable
  • 5+ years of experience with Enterprise and/or Cloud based solutions
  • 5+ years of Java development experience
  • Experience implementing solutions which required Secure Identity
  • Experience developing/working within large distributed systems
207

Senior Security Architect Resume Examples & Samples

  • Provides architectural guidance and leadership on best practices regarding security in software development, user interface design frameworks, high performance messaging solutions, server side development, integrations and tools and technologies
  • Works with the business and systems team to identify the right architecture for implementing new solutions, products and modules. Develop, implement and maintain product security strategy for the entire product portfolio covering IoT, SmartGrid suites
  • Contribute to the development and evolution of the application and infrastructure security reference architecture. Develop, implement and maintain the security architecture for Sensus product portfolio
  • Risk analysis, risk management, and communication of results with software/hardware development managers
  • Champion the Sensus’s product security SDLC. This includes security testing, penetration testing identifying and fixing vulnerabilities in software and applications on all Sensus products
  • Perform vulnerability research, assessment and management , serve as technical security/risk advisor on all new technology/developed by Sensus
  • Perform threat modeling, static application security testing, code reviews, and secure design reviews for high risk applications
  • Determine testing requirements and strategies, automate security testing using a variety of scripting and open source tools
  • Implement or manage the implementation of common application security controls, ensuring that practices meet software certification processes
  • Assist developers in remediating vulnerability findings by providing line-by-line guidance
  • Provide training and education to developers on software security best practices
  • Ability to present complex security topics to wide range of internal and internal audiences (engineers to executives)
  • Develop architecture, testing and auditing of Cloud computing, and Big Data platforms
  • Act as a Subject Matter Expert in the discovery and investigation of critical security vulnerabilities
208

Senior Security Architect Resume Examples & Samples

  • Ensure corporate security policy (GSAM, CPI-810) is communicated to stakeholders and represent in cross organizational team meetings with CISO/IT security/security working groups as portfolio security SPOC
  • Coordinate External and Internal security audit with internal/external teams and conduct compliance related audit activities
  • Work with IT security and ensure a common security framework is established and operated as part of the SDLC lifecycle
  • Work with IT Security and review application security scans/web application assessments, database assessments, security testing, Identify web and infrastructure vulnerabilities, develop vulnerability remediation plans, review Static/Dynamic code scans and code reviews to improve security, network and software architecture review for portfolio
  • Partner with IT Security to research and implement automated security scanning tools to strengthen security protocols for portfolio
  • Participate in Technical, architectural assessment and management oversight of security controls and systems, Internal System, Application and End-to-end Security
  • Work closely with development teams to plan and implement security measures and controls, research and analyze security tools, evaluate, compare and select for CAO portfolio
  • Ensure the implementation and operation of the appropriate security controls across the organization are aligned with Corporate IT security policies, standards, and applicable regulations
  • Coordinate across multiple teams and organizations from IT Security, Legal, External Audit, Network/Server Engineering, Compliance, and multiple other internal and external organizations
  • Research emerging security technologies and make recommendations to executives on latest products and keep management up to date with latest vulnerabilities and measures to remediate and spread security awareness among application teams
  • Build strong relations with CISO and other security teams to align processes and procedures to ensure common approach to audit/compliance activities and serve as a liaison between different application teams, network teams, sysadmin teams and other stakeholders to foster collaboration
  • Execute projects to improve security event collection, detection, analysis, correlation and response, review security logs and reports, analyze results and take corrective action
209

Security Architect Resume Examples & Samples

  • Solve complex design & architectural challenges to create secure critical infrastructure systems for the government and private sector
  • Evaluate systems for inherent and systematic vulnerabilities, methods of exploitation, and potential impacts
  • Help develop new industry shaping digital trust solutions using modern cryptographic techniques
  • Help deliver cyber secure solutions for everything from the most critical national infrastructures to sensitive government projects
  • Work with a multi-disciplinary team to bid-for, win, and deploy cyber security projects
  • Use risk management methodologies to manage the cyber-security risk to legacy and modern systems within critical national infrastructure
  • Cryptography & key management (algorithm choice & real-world deployment implications)
  • Network design and network security techniques
  • Information Assurance and Risk Management methodologies (e.g. ISO 27k, NIST 800, HMG IS1/2, IRAM2)
  • UK National Technical Authority standards & guidance (design & accreditation)
  • Working in teams to deliver complex solutions
  • Developing innovative solutions to challenging environments
  • UK High Grade systems/network architecture
210

Software Security Architect Resume Examples & Samples

  • Drive overall software security architecture, working closely with product specific technical architecture experts
  • Provide technical leadership in the comprehensive planning, development, and execution of SS&C software security efforts
  • Work closely with product and engineering development teams to ensure that products meet or exceed customer security and certification requirements. This includes ensuring that the security architecture is well documented and communicated
  • Provide planning and input into the software engineering and product development process, related to security, sensitive to the constraints and needs of the business
  • Monitor security technology trends and requirements, such as emerging standards, for new technology opportunities
  • Liaise with corporate level security team to ensure conformity with any existing standards, technologies etc
  • Develop and execute security plans. This may include managing across third-party vendors, and providing guidance (with other departments) to the engineering and testing practices
  • Ensure, and create as needed, security policies, processes, practices, and operations to ensure reproducible development and high quality, while keeping costs under control
  • Engage in hands-on, in-depth analysis, review, and design of the software, including technical review and analysis of source code with a security perspective. Will include reviews of in-house developed code, as well as review of technologies provided by third party vendors
  • Provide primary technical role in the security certifications process, including preparing extensive documentation and working with third-party evaluations
  • Provide training to staff, contractors, development, and quality assurance teams, and product/software security champions related to product security
  • Guide SS&C software development teams through the Security Development Lifecycle (SDL) by participating in design reviews, threat modeling, and in-depth security penetration testing of code and systems. These responsibilities extend to providing input on application design, secure coding practices, log forensics, log design, and application code security
  • Select, implement, and maintain all tools and platforms required for all phases of the SDL
  • Experience with C, C++, C#, WCF, ASP.Net, SQL Server, Microsoft client and server operating systems
  • Bachelors / Masters in Computer Science (ideally with a focus on Information Assurance / Cybersecurity)
  • We would prefer candidates with recognized industry certifications (e.g. CISSP / CISM)
211

Senior Security Architect Resume Examples & Samples

  • Gather and analyze data through interview, observation, workshops, and independent research
  • Stay engaged with multiple project teams and provide architecture / design input
  • Stay current with developing technologies and forecast impact of changing technologies
  • Work closely with other architects in designing solutions that are reusable and cost-effective
  • Collaborate with stakeholders to conduct and demonstrate proofs-of-concept for new products and technologies
  • Develop and deliver training in architecture and modeling topics to technical audiences
  • Minimum 5 years’ experience as a solutions, infrastructure, or enterprise architect
  • Minimum 4 years’ experience demonstrating modeling systems using an architecture modeling tool such as IBM/Rational/Telelogic/Popkin System Architect, Sparx Enterprise Architect or Avolution ABACUS
  • Minimum 2 years’ experience with Foundation in TOGAF and other architecture frameworks and experience applying / tailoring to company needs
  • Ability to be flexible and work analytically in a problem-solving environment
  • Strong coaching and project management skills
  • Strong organizational, multi-tasking, and time-management skills
  • Bachelor’s degree in Computer Science, Information Technology, Computer Engineering or related degree
  • Ability to work overtime as needed
212

Security Architect Resume Examples & Samples

  • Be involved in technical security architecture services for many of our largest global clients
  • Identify security gaps in solution designs and design practical solutions to remediate them
  • Be dedicated to operational and delivery excellence
  • Expert level security knowledge in technical IT domains such as operating systems, networks, databases, cloud or solution development etc
  • Expert level knowledge in assessing solution architectures at the planning and design level for security issues and vulnerabilities
  • Experience in practical security vulnerability remediation
  • Management of multiple stakeholders including business and IT
  • Information Security domains - in particular one or more of the following: Cyber Program Management, Cyber Threat Management, Identity & Access Management, Data Protection, Privacy, Organisational Resilience. This experience should include both advisory and implementation experience
  • Strong technical security skills in assessment, design, implementation, architecture, and program / project delivery and work across various delivery models, (Waterfall, Agile, DevOps)
  • Industry related certification preferred (e.g. CISSP, CISA, CISM, SABSA, PRINCE2, TOGAF, ITIL)
213

Security Architect Resume Examples & Samples

  • Provide technical security expertise to the development teams under KPMG Spectrum including communicating security architectural decisions, benefits, risks and other activities include vendor reviews, security requirement definition, and facilitation of security testing and management of residual risk
  • Serve as the Security Lead in the design, implementation and integration phases of KPMG Spectrum business products to meet client and firm security requirements, address corporate risks and exposures in cloud-based solutions
  • Serve as a liaison and primary point of contact between KPMG Technology Security and Risk and KPMG Spectrum on security related matters
  • Interact with clients, project teams, KPMG partners and other senior members of the firm to provide advice on security and assist with compensating control alternatives where security requirements cannot be met
  • Serve as the Security expert across security architecture functional areas; credential management, access provisioning, authentication and authorization, application security, infrastructure security, data security, security monitoring and operation security
  • Serve as escalation for the risk assessment team as it relates to outstanding security risks under KPMG Spectrum
  • Minimum eight years progressive experience in IT security, with minimum of five years of performing IT security risk assessments and five years of leading security architecture efforts that requires close collaboration with project teams and business stakeholder
  • Bachelor's degree from an accredited college/university and CISSP certification; CISM, CISA, CRISC, CIPP, CGEIT or ITIL certifications is preferred
  • Experience in software development and delivery for market facing products
  • Strong understanding of cloud computing architecture, technical design and implementations, including Infrastructure as s Service (IaaS), Platform as a Service (PaaS) and Software as Service (SaaS) delivery models; strong knowledge of secure development and general software development methodologies and practices
  • Excellent verbal/written communication, collaboration, analytical and presentation skills to lead an environment driven by customer service and team work; ability to facilitate communications to business stakeholders and interact with all levels of management; ability to work in a highly collaborative environment and comfortable with ambiguity
214

Security Architect Resume Examples & Samples

  • 8 years of relevant experience and a Bachelor’s degree in in computer science, operations research, or related field
  • 2+ years of experience designing secure complex distributed systems
  • Security certifications (e.g., CISSP) are a plus
  • A strong work ethic and a positive attitude
  • Excellent technical aptitude and a desire to learn constantly
  • Experience with industry compliance and security standards including one or more of the following: PCI, ISO 27001, HIPAA, NIST/DoD frameworks, HITECH, FedRAMP
  • Programming experience, preferably with a diversity of languages
215

Security Architect Resume Examples & Samples

  • Architect and design security solutions appropriate for our infrastructure
  • Provide clear, well-documented security standards that support our security principles and compliance needs
  • Drive project scoping, roadmap and architecture discussions with business stakeholders, technical leads and management
  • Give security consultation to the Infrastructure organization and to salefsorce.com customers
  • Provide security training and partner with trainers throughout the organization on security materials and presentations
  • 15 years or more experience in infrastructure security
  • 10 years or more experience in network security architecture, system security design or encryption systems architecture
  • BS/BA degree in computer science or similar, or equivalent work experience
  • Experience in designing and implementing security lifecycle management in infrastructure or software development environments
  • Expert-level experience/understanding of network, systems and software security and application of theory to practice
  • Track record of delivering technically demanding cross-organizational projects
  • Experience working in a large, high volume, multi-tenant, customer-facing environment
  • Excellent leadership and mentoring skills, with an ability to develop Engineers
  • Collaborate with management as well as technical and business leadership
  • Excellent conflict resolution and team building skills. Ability to communicate and align people within the organization, gaining the cooperation of those who may be needed to make a technical vision a reality
  • Proven strong innovative and analytical skill with extensive implementation skills
  • Candidate must have extensive experience working within structured change management processes for highly available enterprise systems
  • Working knowledge of system hardening best practices and methods and access control methodologies
  • Ability to explain complex technical issues to non-technical people
  • MS degree in Computer Science or equivalent
  • Prior experience working within a regulatory compliance and IT governance framework including but not limited to FedRAMP, FISMA, ITIL, SOC, and PCI
216

Security Architect Resume Examples & Samples

  • Refine the security framework, assess security development priorities for the portfolio, and provide leadership through articulating the vision within PLM, R&D and senior management
  • Identify key security technologies and work closely with R&D and product security primes to define the system architecture for implementation
  • Review product and system architectures and designs from a compliance perspective
  • Identify best practices in Design for Security and champion process improvements within both Agile and Hybrid development methodologies; provide technical guidance for security testing activities and results assessment
  • Work closely with Sales Engineering and Product Support during advanced customer engagements providing security technical guidance within a customer-centric context
  • Work with R&D Security Operations, to provide validation of product remediation and workarounds in response to security vulnerabilities
  • Act as the R&D escalation point for all product related security issues
  • University degree in Computer Science or Electrical Engineering or equivalent experience
  • 3 years of Sr. Security experience
  • 3 years of experience in a Sr. Technical role
  • 10 years’ of experience driving decisions with non-technical stakeholders
  • 7 years’ experience in a software development role
  • Engagement experience with Enterprise customer and service providers, as well as V- and C-Level executives
  • Professional security designation (e.g. CISSP)
  • Exposure to Common Criteria, FIPS, IL3/4, ITHC security requirements
  • Exposure to PCI, HIPAA, FINRA, FERPA regulatory and industry compliance requirements
  • Experience working within Agile and Hybrid methodologies in ISO compliant organizations
  • Experience with Hardware Security
  • Experience with Secure Manufacturing
217

Security Architect Resume Examples & Samples

  • Along with centralized functions define strategy for Data Protection scope, work on implementing that strategy across the department and make it available for the whole organization in a service oriented model
  • Identifying gaps and deficiencies in the Bank’s security landscape and working with other architecture functions on defining strategy to address them
  • Working alongside product management to help define and shape the product and service strategy in the Data Protection realm
  • Design technical blueprints for the solution based on requirements from various stakeholders including: Business Customers, Compliance, Risk, IT Security and IT Architecture
  • Working with engineering leads, SMEs and external parties ensuring product and service are designed inline with security architectural guiding principles, Bank’s control environment and industry best practices
  • Overall 7+ years of experience which span one or more IT disciplines like: designing, development and/or deployment of software or infrastructure in the relevant areas
  • Overall 4+ years of experience in a role dedicated to architecting/implementing solutions utilizing recognized design and architecture patterns and industry standards
  • Excellent knowledge of Data Security concepts, products and the IT Security Domain
  • Confident, assertive and effective communicator with strong influencing skills
  • Able to target material and communication to a wide range of audiences at all levels in the organization
  • Good knowledge in Cloud and Application security concepts
  • IIBA Certification (CCBA, CBAP) or equivalent
  • Experience in financial sector will be an additional asset
  • Experience and good knowledge of global jurisdictional practices/financial regulators requirements
  • Security certification is an advantage: CISSP, CISA, CSSLP, TOGAF
  • Experience with following products/vendors: Symantec DLP, IQP Secure Islands/MS RMS, Skyhigh, MS PKI
218

Security Architect Resume Examples & Samples

  • Identifying gaps and deficiencies in the Bank's security landscape and working with other architecture functions on defining strategy to address them
  • Working with engineering leads, SMEs and external parties ensuring product and service are designed inline with security architectural guiding principles, Bank's control environment and industry best practices
  • Partial engagement in engineering tasks in the above specified areas
  • Overall 8+ years of experience which span one or more IT disciplines like: designing, development and/or deployment of software or infrastructure in the relevant areas
  • Excellent knowledge of Cloud/Data/Application Security concepts and the IT Security Domain
  • Engineering/hands-on experience with cloud security, data leakage prevention, information right management, public key infrastructure and web applications security
219

IT Security Architect Resume Examples & Samples

  • Create information security intelligence, security analytics, information security architecture
  • Determine security requirements by evaluating business strategies and requirements, researching information security standards, conducting system security analysis and risk assessments, studying architecture/platforms, identifying integration issues, and preparing cost estimates
  • Recommends security standards by evaluating industry trends and risks and leveraging knowledge of SME's for network, server, and application resources
  • Participate with infrastructure and application project teams providing consultation on information security
  • Works on improvements for added security services including the development of new tools and supporting assets
220

Security Architect Resume Examples & Samples

  • 6 Years of security experience
  • 6 Years of experience with Compliance and security assessments
  • 6 Years of experience working with infrastructure and network technologies such as Cisco, VMware and HyperV. (Must be hands on experience)
  • Must have experience with SailPoint
  • Security Architect will be viewed as an expert in the field of information security and provide technical leadership in the development and implementation of information security architecture. Certification and Accreditation, security reviews for all IT Services in the Enterprise Portfolio Management system. Security control management that follows ISO 27002
  • Create and maintain Architecture Decision documents to establish the 'What' and 'How' technologies will be used and create overarching Strategy documents to address the 'Why' Combined they provide a foundation for the ITIL Service Design Package and a blueprint for integrated decision making and cost effective IT service management
  • Develop and maintain core foundational technology standards that can be reused as building blocks in solution design of IT services
  • Responsible to lead and provide hands-on work for research and development of information technology solutions. This includes proof-of-concept stand-up, testing and evaluation leading to a technology recommendation that is cost-justifiable based on business value provided by the solution. Present recommendations to senior business and IT Governance leaders
  • Build strong relationships and collaborate with IT Business Architects and members of the Enterprise Architecture community of practice to collaborate on the technology recommendations for new or changed IT Services in the Enterprise Portfolio
  • Responsible for stewardship of the Enterprise Portfolio Management repository. Ensures information is relevant and updated in a timely manner
  • Collaborate with IT Service owners and SMEs as technical lead in Service Design activities to ensure definition of proper technical milestones and tasks are mapped out correctly that lead to EBS development. Participates in oversight function during toll gate reviews of projects to ensure technical execution and benefits realization
  • Mentors less experienced Systems Architects by guiding, training, advising and providing support
  • Analyze, troubleshoot, and investigate security-related, information systems' anomalies based on security platform reporting, network traffic, log files, host-based and automated security alerts
  • Perform security analysis, risk and vulnerability assessment to assess and mitigate security threats/risks
  • Perform security accreditation/certification documentation for proposals and projects
  • Create and maintain security policy and procedures<
  • Conceptualize and implement security systems and architectures
221

Security Architect Resume Examples & Samples

  • Experience with Malware Protection. Clientuses Cisco AMP4E (advanced malware protection) The person should be comfortable with security investigation using these tools and remediation
  • Experience working with IDS and IPS - Client uses Cisco FirePower(formerly known as Sourcefire) - They are open to similar tools
  • . Experience understanding and determining vulnerabilities
  • Networking background helpful (Cisco preferred). The security director mentioned a strong networking background goes a long way to helping analyze data and work with the related teams (e.g. the networking team)
222

Security Architect Resume Examples & Samples

  • Develop secure architectural solutions as part of the design phase of system development and implementation projects. Develop cost effective strategies for protecting confidential data through use of information security techniques and technologies, including but not limited to: encryption technologies; access control; DMZ architecture and network security zones; content monitoring and filtering; data leakage tools. Consult and advise Radian project teams regarding information security risks and industry practices
  • Architect and consult on a comprehensive suite of IT Policies. Assist develop and maintain information security policies and standards. Develop and coordinate issuance of information security awareness publications and courses to ensure Radian community is aware of the company's information security policies
  • Lead and drive the security services portfolio. The Radian Security Services portfolio is the collection of security services operated on behalf of the Radian Group (aka, the Enterprise) -- ensuring that all programs deliver high quality capabilities and are measured in an objective and effective manner
  • Develop and maintain an information security risk assessment and metrics program. Periodically engage independent third parties to test Radian's IT security controls. Liaise with internal and external auditors. Coordinate remediation of security vulnerabilities discovered through testing and/or audits
  • Evaluate emerging technology and security software tools for benefit and compatibility to Radian's infrastructure. Assist the VP, Security Architecture in developing and maintaining information security roadmaps
  • CISSP (with concentration in Architecture preferred), GIAC, Security +, CISM, CISA or other security or IT/security certifications
  • Expert knowledge of information security concepts, including but not limited to: policy definition and enforcement; service-oriented architecture (SOA) and web services; network/perimeter security; system hardening; security hardening; security event monitoring; vulnerability assessment and remediation; patch management; anti-virus; intrusion detection and response; forensic; encryption technologies; secure coding; identity and access management; strong authentication; and content monitoring & filtering
  • Expert knowledge of IT architecture body of knowledge
  • Working knowledge of relevant technology, including but not limited to: Microsoft Windows; Unix/Linux; mainframe systems; network and web application firewalls; vulnerability scanners; intrusion detection systems; security event management systems; Internet proxies; encryption tools; digital certificates; and data leakage tools
  • Strong analytical, process and influence skills as well as written and verbal communication skills
  • Excellent time management skills to effectively meet multiple objectives
  • 5-8 years of related work experience
223

Chief Security Architect Resume Examples & Samples

  • Works with architects, engineers, and developers who are constructing the big picture as well as the operating components (virtualized hardware, software, and API’s) and highly distributed complex applications
  • Reviews and analyzes the overall architecture of complex systems (full stack, Hardware to Software) Designs, develops and communicates software resilient solutions
  • Assesses risk of system failure, security exposure, performance issues and develops an appropriate resilient solution to provide a balanced mitigation to these threats
  • Participate in application architecture and code reviews to ensure resilient principles are being incorporated into internal developed as well as vendor developed solutions
  • BS Degree and a minimum of seven (7) years of prior relevant experience on a program of similar complexity and importance to the Government
  • Extensive hands on and theoretical experience with the security design and development of highly distributed, complex applications
  • Knowledge of healthcare enterprise security architecture standards
  • Must be either a US Citizen or Green Card Holder
  • M.S. in CS or related field or equivalent experience desired
  • Experience working on mission critical applications for a Federal Government customer is desirable
  • CMS experience is highly desirable
  • Excellent communication (verbal and written), team and project management skills
  • Experience with enterprise identity management solutions such as OKTA, Oracle, and CA
224

Security Architect Resume Examples & Samples

  • Considered an SME in multiple security technology areas such as network, system, identity security, identity management or configuration management
  • Experience with enterprise security solution design and implementation skills covering Identity and Access Management, Infrastructure and application security, and privacy and data security
  • Experience of security architecture evaluation
  • Strong written and verbal English skills
  • Excellent communication skills, able to elaborate, articulate and present at all levels
  • Industry recognized security qualification (CEH/GIAC/SSCP/CISSP/CISSP-ISSAP
  • Strong experience in data center and cloud architectures across multiple disciplines
  • Experience of Security frameworks (ITIL/ISO/COBIT) and/or standards/practices such as CIS/DISA STIG/NIST
  • Experience of industry and regulatory compliance requirements such as PCI DSS, SOX/HIPAA etc
  • Ability to communicate security issues to peers and Senior Management
  • Experience of defining/refining system security requirements for solutions
  • Experience securing server operating systems (Windows 2012 and Linux Red Hat)
  • Some knowledge of programming frameworks and scripting languages (Java, Ruby, Python, or PowerShell)
  • Understanding of EMC Products, Solutions and Strategy
  • Security Clearance would be preferred
  • Familiarization with SCAP and Security Automation
  • Awareness of Cloud Foundry or other PaaS solutions would be beneficial
  • Awareness of Big Data and Hadoop Eco-System would be beneficial
225

Senior Security Architect Resume Examples & Samples

  • Min 5 years of experience in the field of Information Security
  • Must have CAN Government Security Clearance (Secret Level or Higher)
  • Must have worked in an Architect capacity in atleast one or more of the Security competencies like SSRC, SIOC, IAM, Infrastructire & End Point
  • CISSP, SABSA, CISM or similar certification
  • Experience in Network Security Consulting
  • Experience on working with at least 2 of the products such as Checkpoint, ASA, McAfee, Fortinet, Bluecoat, CISCO SourceFire
  • Experience in working on projects for the CAN Federal Government
226

Security Architect Resume Examples & Samples

  • Awareness new Security technology, opportunities and threats which face the IBM & Client account
  • Subject Matter expertise to projects and other major changes proposed for the account
  • Security Architectural governance for projects delivered to the client
  • Pro-actively identify opportunities for the exploitation of new technologies for Security purposes and work collaboratively with client Security organisation to support the realization on the client account of appropriate improvements in the use of technology for Security
  • Act as an extended part of the Account Architecture team and provide appropriate governance for technical security aspects and implications
227

Security Architect Resume Examples & Samples

  • Works with the project team to optimize the design and structure of subcontracts
  • Ensures that the subcontracts placed reflect the requirements of the business
  • Ensures all subcontracts entered into by CWC are on terms and conditions and where appropriate at prices acceptable to CWC
  • Manage subcontract risks
  • Negotiates subcontracts with suppliers
  • Manages subcontract claims and variations received/issued by CWC
  • Management of subcontracts post contract award through the full development life cycle (design, manufacture, test, acceptance) ensuring subcontractors deliver to agreed requirements and schedule
  • Develops appropriate reporting and subcontract management processes for projects
  • Interacts with all levels of the organization
  • Advises management and staff on the practical and necessary steps to ensure corporate processes are followed
  • Provide advice and guidance to business as required
  • Further education, A-Level minimum or equivalent and/or ability to demonstrate competence to successfully carry out the requirements of the role
  • Extensive (anticipated at least 5 years) commercial contracts and contract/subcontract management experience
  • Ability to review, draft and negotiate subcontract terms and conditions
  • Experience of negotiating claims and variations to contract with subcontractors
  • Knowledge of contract law
  • Exceptional negotiation and influencing skills
  • Good knowledge of contract & subcontract terms and conditions and application in bids
  • Must have strong problem solving and planning skills
  • A strategic individual with good judgment and strong professional and ethical standards
  • A well-organized individual who can relate to management, line workers, government officials, customers, and visitors
  • Leadership -- a demonstrated ability to lead people and obtain results through others
  • Flexible, as some out of hours and weekend working may be required. Some domestic and foreign travel may also be required
228

IT Security Architect Resume Examples & Samples

  • Define the current technology design and implementation, and identify issues within it
  • Ensure the design meets the business service level agreements (SLAs) for availability and performance
  • Iteratively document and improve design and implementation approaches, services provided, and usage processes and approaches
  • Provides essential input into the selection and evaluation of new technologies or applications in support of Domain and Enterprise Architects
  • Experience integrating new technologies with existing technologies
  • Strong knowledge of IT Security Architecture
  • Strong ability and comfort communicating technical solutions weekly with Director and VP level
  • Bachelor’s Degree in Computer Science or a related field and a minimum of 8 years of related experience
  • HIPAA/HiTrust
229

Software Security Architect Resume Examples & Samples

  • To do this job,you need to have Skills: (not all required but some minimum knowledge is needed on each)
  • Software security: cryptography, PKI, Network, Web attack
  • Software development: WebApplication, J2EE, Java Security, Web Service (REST/SOAP)
  • Security audit: DAST (IBM AppScan Standard, HP WebInspect, BurpSuite), SAST (HP Fortify), penetration tests in general
  • Internet technology: HTTP(S), Web Service Security, PKI/X509 certificate, OAUTH, Web Application Firewall
230

Systems Security Architect Resume Examples & Samples

  • 5+ years experience in one or more of the following areas : -
  • Embedded platforms security (e.g., ARM TrustZone, TPM, smartcards)
  • Wireless communication systems and protocols (CDMA/UMTS/LTE, Bluetooth, 802.11)
  • Hardware / SoC security
  • Cryptography
  • Participation in standards organizations like IETF/3GPP/3GPP2
  • Prior software development experience (C, C++, C#, Java, Windows, Linux) and knowledge of software vulnerabilities - OS architectures (e.g., Android, Linux, iOS) - IP security protocols (IPsec, SSL/TLS)/ Packet data network security - Multimedia systems security design (e.g.VoIP/IMS) - Web technologies or applications (e.g., HTTP, HTML5, XML)
  • LI-SRC
231

Security Architect Resume Examples & Samples

  • Develop and improve IT security related procedures within the company
  • Identify threats, vulnerabilities and potentially anomalous designs
  • Help the IT team with improving the security of internal IT infrastructure
  • Handle all security related incidents as a member of the Unity CERT team
  • Consult and coordinate with external security audit companies when external help is required
  • Hands-on knowledge on securing network infrastructure (routers, VPN links, legacy and next-gen firewalls)
  • Hands-on knowledge on securing corporate infrastructure (AD, wifi, SSO)
  • Experience with managed endpoint security
  • Understanding of securing cloud-based solutions (e.g. AWS, GCE, OpenNebula, Docker, Kubernetes) and the integration between corporate infra and cloud is a definite plus
  • IT related degree or 5+ years of relevant experience
  • Experience from a similar position is a plus
  • In-depth understanding about IP networks, network protocols, firewalls and a multi-OS environment
  • Ability to comprehend relationships between interlinked systems
  • Ability to judge and evaluate business and technical requirements
  • Excellent in planning, executing and troubleshooting
  • Service oriented and good communications skills, both oral and written
  • Dependable and focused on delivering quality service with accuracy and thoroughness
  • Good at adapting to changes, delays and unexpected events
  • Experience in handling different stakeholders and competing demands in a complex set-up
  • A will to make things happen in spite of obstacles
  • A good sense of humour and a positive attitude
232

IT Security Architect Resume Examples & Samples

  • Plan, analyze, and design global security systems including network monitoring, intrusion detection and prevention, identity management, access control, mobile device management, and data protection
  • Initiate upgrades to security systems as necessitated by technology availability and maturity, security gaps, emerging threats, business risk and needs, and cost effectiveness
  • Serve as a primary security contact for projects during the planning, analysis, and design phases of projects
  • Provide IT security technology and process guidance for enterprise architects and the business
  • Monitor ongoing projects to verify that security components are built and deployed as originally designed
  • Assist in reviewing compliance to Zurich’s reference security architecture and industry standards, internal policies, and procedures
  • Improve the security posture of business systems by planning and designing the delivery of security within the solutions
  • Evaluate security at all levels including network (firewalls, routers, etc.), server (mid-range, mainframe, virtual, appliance, etc.), OS (Windows, Linux, OSX, iOS, Android, etc.), application server (WebLogic, JBoss, WebSphere, etc.), application (Java, JSP, .NET, etc.), data store (Directory and database), authentication mechanisms, authorization procedures, auditing/logging, and user administration and access control
  • Consult on security considerations based on system delivery models including internally hosted, cloud hosted, cloud managed, mobile, etc
  • Bachelors Degree in Computer Science or Engineering and 8 or more years of experience in the Communications or Project Management area OR
  • High School Diploma or Equivalent and 10 or more years of experience in the Communications or Project Management area AND
  • Experience in strategic and operational consulting or business systems
  • Integration Insurance application system design/analysis experience
  • Experience in leading teams using/creating use cases, Rapid Application Development (RAD) tools/techniques, requirements modeling and associated tools, Software Development Life Cycle (SDLC), functional and systems requirements, requirements traceability documents, and testing scenarios and execution
  • Ability to identify and consider business implications of the application of technology to the current business environment
  • Certifications a plus: CISM, CISSP, CISSP-ISSAP, TOGAF, CEH
  • Experience with calculating and assess risk based on threats, vulnerabilities, and mitigating factors
  • Experience with best practices and methods of IT strategy, enterprise architecture and security architecture
  • Exposure to business planning, systems analysis and application development
  • In-depth knowledge of financial services industry including detailed knowledge of insurance business processes and processing
  • 'Hands-On' management experience at multiple levels within an financial services/insurance organization
  • Project Management Institute Project Management Professional Certification
  • Advance Microsoft Office skills
233

Senior Security Architect Resume Examples & Samples

  • Sets security vision and direction, collaborates and drives development of security strategies and long-term planning
  • Develops, documents, communicates, and enforces security standards, policies and procedures to improve the security environment
  • Analyzes the current environment to detect critical security deficiencies and ensures fixes are implemented in line with policies
  • Provide architectural leadership and design capabilities to ensure Network Architecture is properly implemented and maintained
  • Analyze current System, Network and Application reference models
  • Minimum of 12 - 15 years’ experience in the information security industry
  • Experience with PCI compliance, PCI Qualified Security Assessor (QSA) is a plus
  • Working experience with ISO 27001, CoBIT, SOX and/or other Information Security Management frameworks
  • Demonstrated security platform design and implementation experience
  • CISSP or other Security certifications is a plus
234

Security Architect Resume Examples & Samples

  • ​Develop security strategy and roadmaps in Lazada’s defined Security Architecture domains
  • Communicate strategies and roadmaps to both senior business and highly technical stakeholders
  • Define, develop and deliver security projects supporting Lazada’s security strategy and roadmaps
  • Develop security solutions for business projects to ensure all business systems comply with Lazada’s legal, regulatory and security requirements
  • Identity security gaps in Lazada’s landscape and recommending security solutions, where appropriate, that can leverage on existing capabilities and deployed technologies
  • Security vendor and business partner management
  • Bachelor’s degree in Computer Science, Engineering, or equivalent experience
  • Minimum 8 years’ of experience in a technical security function in a large enterprise environment
  • Experience with security solutions design and architecture is a must
  • Hands-on practical technical experience is essential for this role
  • TOGAF 9 Certified and/or SABSA Certified is desirable
  • CISSP-ISSAP Certified is also desirable
  • Excellent problem solving
235

Security Architect Resume Examples & Samples

  • Drive or participate in CyberSecurity Programs across the Motorola Solutions product portfolio, encompassing Motorola Solutions proprietary products, as well as, integrated third-party products
  • Drive Vulnerability technical risk impact assessment, resolution, and management with the MSI product development teams
  • Support of system and subsystem Federal Information Processing Standard (FIPS) and Department of Defense Instruction 8500.2/DIACAP certification cycles including collection and analysis of results
  • Drive or participate in Platform Security for Cloud and On-Prem technologies, encompassing Cloud Provider Environments; Networking; Virtualization; Operating Systems; Container Technologies, and Application/Network Services
  • Seek, recommend, and propose solutions to avoid Vulnerability risks proactively
  • Develop, oversee, and drive CyberSecurity improvement features into Products
  • Drive audits and assessments of products to DIACAP, DISA, STIG, NIST, FDCC, USGCB and CJIS compliance benchmarks
  • Drive and Oversee Technical CyberSecurity Risk Mitigation
  • Lead and/or support the secure design and implementation of detailed system, subsystem and software test strategies, configurations and procedures
236

Security Architect Resume Examples & Samples

  • SIEM (ideally Splunk)
  • Application Architecture
  • PCI Compliance (can make the right organizational decisions as it relates to passing security audits/ has experience in being part of an environment that has been audited by QSA.)
  • Perform information security risk assessments for IT projects. Recommend design solutions that achieve defense-in-depth and mitigate exposure to threats
  • Execute internal and external vulnerability scans. Review and validate scan findings. Engage with Network, Linux, Windows, and Application Development teams to remediate issues in a timely manner
  • Research security advisories, news feeds, and threat intelligence sources. Evaluate impacts to the infrastructure and advise on appropriate actions to protect the organization's network and systems
  • Perform security-focused source code reviews and collaborate with development teams to implement solutions that address significant findings
  • Define and execute response procedures to effectively address security incidents
  • Support year-round compliance with PCI-DSS and other regulatory mandates
  • Update and enforce Information Security Policies and Procedures across the organization
237

Senior Security Architect Resume Examples & Samples

  • Liaison between corporate Information Security, Enterprise Architecture and the development groups
  • Help design application’s interfaces with security products, review development projects for risk, and understand how to interact with development groups
  • Understand the security challenges across multiple platforms, including mainframe, open systems and desktop
  • Effectively communicate risks discovered or created to programmers
  • Preferred - One or more security certifications (CISSP, GISP, GSEC, CEH). Technical certifications a plus over general certifications
  • 1+ years of experience architecting and developing applications for web and desktop applications
  • Preferred – 1 to 3 years of experience leading an application security team
  • Experience in a very large, commercial, multi-platform technology organization
  • Strong ability to problem solve
238

Security Architect Resume Examples & Samples

  • Ensures that all data is protected from unauthorized modification, destruction and disclosure
  • Monitors all computing environments for compliance and evidence of intrusion
  • Installs new software releases and system upgrades
  • Provides training and technical leadership to less experienced team members and internal customers
  • Assists with Information Security documentation in the System Security Profile (SSP) for review by CMS and external auditors
  • Cooperates in all official external evaluations of the business partner's Information Security program
  • Ensures an operational IT Systems Contingency Plan is in place and tested
  • Excellent communication skills along with strong technical skills
  • Displays time management skills to effectively and efficiently meet schedules and deadlines
  • Works with a heavy workload on multiple concurrent tasks
  • Understands and recognizes organizational structure and how it can impact project success
  • Must be a positive representative of HMS Security with an “enablement” mentality
  • Certifications such as CISSP, GCIH, or CISM desired
  • 6+ years of experience required; Master’s degree preferred
  • 3+ year’s hands-on technical experience maintaining Internet/DMZ infrastructure
  • Experience administering firewalls such as Cisco ASA or Palo Alto Firewalls
  • Multifactor Authentication experience
239

IT Security Architect Resume Examples & Samples

  • Maintain current knowledge of emerging security threats and their applicability to REI’s environments
  • Participate in cyber defense exercise development, planning and participation
  • Manage IT Security Architecture Principles, Policies and Standards
  • Manage IT Security Technology Roadmap
  • Provide IT Security Architecture oversight as part of data governance committee(s) and programs partnering with Enterprise Information Architect, Legal, and Information Security
  • Security design reviews/assesses security implications for introduction of new or differing technologies
  • Advocates and champions of Enterprise Architecture concerns to project teams managed by their domain’s project portfolio
240

Software Security Architect Resume Examples & Samples

  • Designing, and participating in the development of, security-related features of the Aster Analytic Engine,
  • Elevating the security profile of the Aster engine,
  • Developing and implementing secure development practices and processes across the Aster development team,
  • Participating in Teradata-wide security initiatives,
  • Providing technical leadership, guidance, and mentorship to the Aster development engineers
241

Security Architect Resume Examples & Samples

  • The Senior Security Engineer will design network security perimeter architecture, review internal and external IT projects and applications for risk and adherence to security policies, standards, and industry best practices. This position will lead and participate on multiple internal security project teams to evaluate and deploy security technologies globally and to make design recommendations for hardware/software products for the firm. Must define, document and design secure infrastructure and application architectures within the primary tenants of Availability, Integrity and Confidentiality
  • The Senior Security Engineer is responsible for maintaining and updating multiple product road maps supporting the secure infrastructure framework. This position will provide thought leadership regarding solutions, designs, architecture, integration, support, strategies across the entire organization to include decision making through successful implementation while employing the highest levels of integrity. Every decision must consider both direct and indirect impacts on the global MMC IT infrastructure
  • Drive and implement key security strategies within the Marsh & McLennan operating companies designed to protect thousands of applications and servers world-wide from threats. Responsible to design and implement network security architecture controls in support of hundreds of internal and external business IT projects and applications contributing to revenue growth globally. Review, assess and signoff on business projects with respect to risk and adherence to security policies, standards, and industry best practices for data protection of Company and client data. Lead project teams to include design, connectivity, and software solutions aligning security, cost, performance, and customer requirements to reach viable secure solutions
  • Partner with and provide information security expertise to the operating companies to provide guidance and direction on secure application hosting for hundreds of internal and client facing application systems. Assess applications and the associated data flow for risk to sensitive data, systems, or infrastructure. Collaboratively document security controls and application access requirements associated with hosted applications and systems
  • End-to-End enterprise-wide tier III troubleshooting of network, desktop, server (hardware & software) and application performance & connectivity across the global MMC wide area network as it relates to Information Security. Participate in or lead Computer Incident Response Teams (CIRT) as necessary by providing tier III support to mitigate active security incidents possible threatening the Global MMC computing environment
  • Strong knowledge and experience with Next-Generation Firewalls. Experience with Cisco and Palo Alto is strongly preferred
  • Must have strong experience with Internet Application Hosting architectures, best practices and related technologies to effectively protect externally facing applications at the network and host levels
  • Familiar with common security controls on both Windows and Unix-based operating systems
  • Must be able to quickly and succinctly architect and create technical solution documentation
  • Experience coding/scripting with common languages such as Java Script, Python & Perl is preferred
242

Security Architect Resume Examples & Samples

  • Core Responsibilities and Duties
  • Review of design documentation, challenging suppliers where products fall below the expected standard and arbitrating on cross supplier issues. Areas to be covered include architecture, device support, coverage and control room interfaces
  • Management of technical aspects of change, assessing the merits and impact of change requests and making recommendations to the change steering group. Working with suppliers to resolve technical issues arising from test and integration. Support for related projects, particularly on aspects of integration with the MS and US Suppliers’ solutions
  • Lead assurance of the ESN technical security architecture
  • Work with NCSC to agree any mitigations required to reduce security risks
  • Work across the technical teams to develop solutions to security challenges such as the use of tethered devices, Bluetooth etc
  • Manage identification and closure of security issues with Motorola and EE
  • Support the NSS project to identify a suitable solution for specialist ESN users
243

Senior Security Architect Resume Examples & Samples

  • Drives the technology strategy and solution architecture for Thermo Fisher’s enterprise solutions and the Cybersecurity team’s information security solutions
  • Develop, maintain, and mature a holistic cybersecurity reference architecture for the company – i.e. How do we prevent, detect, and respond to threats?
  • Responsible for the creation of a framework to articulate the security strategy to various audiences (senior technology management, other architecture disciplines, application and systems development groups)
  • Use of influence skills to obtain buy-in and participation from various groups and stakeholders without direct control
  • Work with staff and management across all levels of the organization
  • Collaborates with other IT team managers to ensure consistency, adaptability, responsiveness, and effectiveness of security solutions
  • Relevant technical certificates a plus
  • 8+ years of related cybersecurity architecture, engineering, and SOC work experience
  • Strong analytical and product management skills required, including a thorough understanding of how to interpret customer business needs and translate them into application and operational requirements
  • Excellent verbal and written communication skills and the ability to interact professionally with a diverse group, executives, managers, and subject matter experts
244

Security Architect Resume Examples & Samples

  • Providing information response capabilities and expertise for the MMIS and related shared services
  • Act as the liaison between the business units, application development and the Enterprise Security services group
  • Lead, facilitate, and work with the project team to assess the MEMS and related shared services application security strategy and assist with its implementation and improvement activities
  • Facilitate ongoing application security testing and documentation of testing processes
  • Work with Enterprise Security Services to coordinate application security testing processes for MEMS and related shared services
  • Implement application security testing and processes related to MEMS
  • Act as the lead application security resource to coordinate ongoing security testing processes, perform internal application security testing and coordinate 3rd party application security testing
  • Develop processes, training and other needed activities to ensure ongoing compliance with NIST 800-53 standards related to application development and application security
  • Bachelor's degree, or equivalent combination of recent, relevant work experience
  • Proficient in Microsoft Product suites including, Word, Excel, and SharePoint
  • Have excellent verbal and written communication skills with the ability to facilitate, lead, mentor, and interact professionally with a diverse group of executives, managers and subject matter experts
  • Ability to regularly work under deadlines and capable of working in teams and acting independently, with only general direction
  • Strong application development security and monitoring skills
  • Strong information security and security compliance background with a focus on Application Security for large scale IT systems
  • Application security background with in depth knowledge of NIST 800-53 requirements and HIPAA requirements
  • Demonstrate application and infrastructure security testing expertise
  • Demonstrate a working knowledge of established IT security and privacy frameworks including NIST 800-53 and HIPAA. Knowledge and experience with IRS Publication 1075 is a plus
245

IT Security Architect Resume Examples & Samples

  • The ability to design security solutions covering DLP, SIEM, MLS, IAM,
  • Security in the Software Development Life Cycle (SDLC)
  • The ability to define and scope penetration testing requirements
  • Implementation Engineer (i.e. Product Specialist – HSM, IDS/IPS, IDAM)
  • Information Security Management Principles - A fundamental understanding of ISM Principles is expected covering an understanding of Physical Security, Disaster Recovery, Access Controls, Authentication, Audit, Governance, Risk Management, Security Architecture, Cryptography, Systems Development and Business Continuity
  • IT Systems - A fundamental understanding of IT Systems and Services covering Virtualisation, Mainframes, Cloud Services, Hosting Services, Desktop, etc
  • Systems Development - A fundamental understanding of IT Systems Development principles for Waterfall, Agile, Spiral, break and fix methods applied and used. Good examples may be Rational Unified Process (RUP) etc
  • Italian: Mother tongue
  • Mobile security
  • The application of security architecture patterns
  • Risk assessment
246

Security Architect Resume Examples & Samples

  • Network and Infrastructure Security
  • Provide technical leadership and mentoring to other Solution Architects in the team as appropriate
  • Analyze and qualify prospective and current customer requirements and develop profitable and suitable solutions to meet customer needs, often including complex solution architectures
  • Improve engagement of Solution Architects into customer opportunities
  • Help provide a consistent solution experience to customers across geographies and divisions
  • Tertiary/Degree qualification in Computer Science/Information Technology
  • At least 7 years of relevant working experience in a similar organizational environment with at least 3 years Pre-Sales experience
  • Understanding of the Security industry and evolution of technologies, threats causing vulnerabilities
  • Security industry association membership and attendance; undertaken continuous professional education and knowledge improvement
  • Experience working with technology from Security technology vendors such as; Cisco; Check Point, Juniper, Palo Alto, McAfee, Websense, F5 Networks, RSA, Symantec, Trend Micro, HP, FireEye, Imperva
  • Experience in and knowledge of Security technologies, architectural design principles and methodologies, industry standards and guidelines; best modern practices
  • Strong and effective team membership skills; including the ability to work effectively within a matrix organization and within a multi-disciplined team environment
  • Able to demonstrate good working understanding of ISO27001 and PCI security standards
247

Senior Security Architect Resume Examples & Samples

  • Good understanding of Checkpoint or Cisco ASA security concepts
  • At least Certification : CCNA / MCP / Security + / RHCE / Symantec
  • 5+ years of relevant experience in security Infrastructure management / operations
248

Security Architect Resume Examples & Samples

  • Responsible for the overall security design and implementation for all products, technology and services delivered from the BU
  • Create and maintain a Security Engineering roadmap which maps to product engineering initiatives and business deliveries
  • Responsible for successful implementation of a Secure Development Lifecycle (SDL) process in the organization
  • Interface with other BUs’ Security Champions and participate in company-wide Security initiatives
  • Identify and further Security Education and Learning within the broader organization Required Experience/Skills & Education
  • Working with cross functional and virtual teams
  • An ability to “lead from the side” as well as leadership through a role
  • Proven track record of working in a fast pace dynamic environments
  • Ability to present complex technical/security issues and their resolutions to executive level stakeholders
249

Security Architect Resume Examples & Samples

  • Evaluate security technologies and create recommendations and plans for implementation
  • Work with cross-functional teams in developing solutions to complex business problems
  • Be able to analyze client environments and determine best security technology deployment strategy/method
  • Participate in the Solution Architecture Review for projects, applications, and infrastructure
  • Participate in R&D and Innovation activities
  • Define standardized reference architectures for processes and technology
  • Document standards, solutions, data flows, procedures, and other technical information as directed
  • Evaluate and apply emerging technologies to meet current or emerging business needs
  • Provides master-level technical support to technical staff within the appropriate discipline
  • Mentor members of the technical staff
  • Ability to drive accurate and timely decisions
  • Ability to analyze information and draw accurate conclusions
  • Motivates others
  • Consultative skills, both internal and client facing
  • Mentoring/Coaching skills
250

Security Architect Resume Examples & Samples

  • Responsible for developing and recommending Information Security standards while also operating within the guidance provided by Corporate Information Security policies
  • Provides technical leadership for complex projects and ensures the success of enterprise-level Information Security solution activities
  • Develops and maintains documentation of all IT Security Architecture design, policies, standards, and analysis work. Supports IT Application & Relationship Managers by acting as an Information Security consultant to understand and develop solutions for the business
  • Provide technical knowledge and experience in operational maintenance, availability, capacity planning and monitoring across the OCLC environment
  • Works as part of a cross functional team that deals with the full spectrum of technology and will fulfill the role of third level support
  • Supporting project managers and application/infrastructure teams in identifying, engineering, and coordinating technical security access control implementation activities
  • Gathering requirements, performing gap analysis, developing and presenting potential solutions, and creating detailed design and implementation plans for access management
  • Integrating security into the design and implementation process to conform to established information security standards, policies and procedures
  • Reviewing evolving security requirements and policies and making recommendations for existing systems to ensure security an compliance objectives are met
  • Participate in a 24x7 Information Security Response team
  • Min 3 years of LDAP experience
  • At least 5 years of architecture or security management experience
  • Linux experience
  • Scripting or programming experience
  • Understanding of Security frameworks, such as ISO/IEC 27001, FedRAMP, PCI and Cyber Security Framework
  • Bachelor’s degree in Computer Science, Engineering, Information Systems
  • Hands on experience managing identity and access technologies such as Cyberark, Microsoft Active Directory, F5 APM, SAML, LDAP
  • Certifications: CISSP, CISA, CISM, or other relevant certification