Information Security Architect

Company Name:
Satnam Data Systems , Inc.
Description: Security Architecture role is responsible for building and managing the security architecture processess such as design, assurance, measurement of security controls and solutions. This requires full engagement with staff throughout CIT's technology and business-related departments as well as external vendors and service providers.
Responsibilities include:
Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
Designs security solutions by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.
Verifies security systems by developing and implementing test scripts.
Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
Recommends security improvements by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
Prepares system security reports by collecting, analyzing, and summarizing data and trends.
Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
- Technical Skills in Network Security, Cloud Security, Cyber Security, Data Protection, Identity and Access Management, Application Security, Network Hardware Configuration, Network Protocols, Networking Standards
7-10 years experience in designing, delivering or managing information security services
Experience in an information security role in a financial services organization preferred
Bachelor's degree and CISSP certification preferred
Effective organizational skills (including attention to detail) and the ability to implement change
Strong written and oral communication skills including the communication of complex technical issues & concepts to non-technical staff
Strong knowledge of information systems and security controls, of attack types and methodologies
Knowledge of and experience with applying Common Weakness Enumeration (CWE) and Common Vulnerability Scoring System (CVSS)
Experience working with perimeter technologies (e.g., firewalls, proxies, NIDS) and vulerability management tools
Demonstrated ability to prioritize and manage competing work assignments in a time sensitive environment
Ability to weigh business risks and enforce appropriate information security measures
Ability to manage relationships with outsourced information technology service providers
A high degree of integrity and trust along with the ability to work independently or as part of a team
Notes: The IT Security team is responsible for developing and implementing CIT's technical security controls. The primary goal of the program is to protect the confidentiality, integrity and availability of information resources. Key information security functions and activities include designing and maintaining the security infrastructure, developing and enforcing policies and standards, security awareness training, risk management and assessment, monitoring and metrics, incident management, and threat and vulnerability management.
Apply directly for the job.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.