Cybersecurity/Cloud Security Architect
Arlington, TX 75039 & Irving, TX (Some Onsite Required)
Full-time Opportunity
Job Description:
This nationwide financial services industry leader has an immediate full-time opportunity in Irving or Arlington, TX for a Cybersecurity Architect. This position requires working in the office 4 days per week. This Cybersecurity team is tasked with the security engineering, regulatory response, third party risk, and incident response capabilities. This team enjoys unprecedented support to deliver the highest level of security capabilities using cutting edge technologies and automating mundane tasks, allowing teams to focus on interesting and rewarding security work. You’ll have the opportunity to work on Cybersecurity projects across financial services, automotive, manufacturing, high-tech, and military industries. This requires a team player who want the freedom to innovate leading edge capabilities to join a growing Cybersecurity team.
You will be responsible for the development and delivery of a comprehensive Cybersecurity program to assure that information created, acquired, or maintained is used in accordance with its intended purpose and to protect information, applications, and infrastructure from all threats. Additionally, the program will comply with all statutory and regulatory requirements for information protection, privacy, and cybersecurity.
Required Skills & Experience
- Bachelor’s Degree in Information Technology, Information Security, Information Assurance, Information Management in related field or equivalent work experience required
- 7-10 years experience as a Cybersecurity Architect with a large enterprise company.
- 2-4 years of experience securing cloud deployments on common platforms like Microsoft Azure, Amazon Web Services, or Google Cloud Platform.
- Experience within the financial services/FinTech industry or another heavily regulated industry required
- Experience with firewalls, IDS, log management and troubleshoot network devices required
- Experience with managing infrastructure through CI/CD pipelines required
- Experience with securing container deployments, Kubernetes, managed Kubernetes PaaS services, Agile environments, and DevOps environments preferred
- Certification in one or more Cybersecurity disciplines (CISSP or CISM) or equivalent experience required
- Certifications in Cloud Cybersecurity (eg, CCSP, CCSK, or cloud provider specific) preferred
- In depth, hands-on understanding in application architecture and technology including web applications, mobile technology, and identity and access management
- Possesses knowledge in various information security areas, such as: Identity and Access Management, Threat and Vulnerability Management, Information Risk and Governance, IT architecture, Cloud Architecture, Monitoring, Incident Response, and Security Strategy
- Stable work history with excellent communication skills.
What You Will Be Doing
- Developing and designing comprehensive security processes and controls into the IT infrastructure.
- Designing and maintaining a secure development life cycle.
- Proactively engaging with other departments to define initial requirements by analyzing threats and risks, facilitating security reviews to identity vulnerabilities, and testing and validating security requirements' alignment for new and redesigned deployments.
- Analyzing the threats and risks to consider malware analysis, vulnerabilities, and known exploits.
- Working with the application teams and IT groups by providing information on Cybersecurity practices, risk assessments, and supporting incident response in the investigation of incidents.
- Working with internal and external groups to validate the proper Cybersecurity policies and standards are effectively operating.
- Assist in the articulation and implementation of the Cybersecurity Strategy across departments and organization.
- Work with IT departments, IT Architects, data custodians, and governance groups to develop and update Cybersecurity controls, requirements, processes, procedures for secure infrastructure and application architecture
- Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security, vulnerability analyses, and risk assessments; reviewing architectures and designs; identifying integration issues; and preparing cost estimates
- Provide function and business requirements for security solutions, initiatives, and identified areas to improve Gsecurity posture
- Recommend and implement changes in security policies and practices in accordance with changes in regulatory or financial services industry cybersecurity practices
- Provide input to Engineers and Developers for additional configuration of application firewalls via IT project management and change management
- Manage the efforts to conduct Cybersecurity control assessments for systems which store customer or sensitive information whether hosted internally or cloud based
- Assess, advise and communicate security risks associated with development practices in place.
- Assist Cybersecurity Management in creating, reviewing, and updating the Cybersecurity Strategy on a periodic basis
- Plan security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards
- Monitor adherence to standards in architecture, application design, development, and testing frameworks
- Partner with infrastructure, application, and other stakeholders to ensure deployed solutions minimize security and privacy risks
- Act as a mentor providing guidance to all team members on security issues
- Collaborate on the development and delivery of an education and training program on Cybersecurity and privacy for employees, contractors, and other authorized users
Thank you!