
IT Security Architect
Bnk To The Future
contract
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Tech Stack
About the role
- Develop and maintain robust corporate security architecture
- Creating and maintaining information security policies and procedures
- Selecting and implementing new information security technologies
- Creating information security training programs
- Collaborate with software development teams to ensure the latest security issues are proactively addressed
- Responsible for network design and security processes
- Highest tier of escalation if particularly difficult information security issues emerge.
- Directs and oversees project engineering staff
- Creates and manages security documentation.
- Improve processes for assessing and managing security risks
- Collaborates with business leaders to ensure the effective and efficient operation of the IT Security processes
- Ensures timely completion of project tasks under their purview
Requirements
- 5 or more years experience working in IT Security
- Experience working with complex, large scale software development projects of diverse teams (desired)
- CISSP Certification (desired)
- Degree in Information security or equivalent (required)
- Post graduate degree preferred
- Experience as a hands on system administrator, network administrator or both (required)
- Experience using Agile concepts to manage the Software Development Lifecycle
- Demonstrated exceptional critical thinking and problem-solving skills
- Strong verbal and written communications skills to write clearly and concisely in English (required)
- Motivated and self-driven
- Must be able to multi-task, be flexible, and detail-oriented
- Interpersonal and business skills to interact with diverse individuals and staff in all levels effectively
- Understanding of Atlassian team management tools or similar
Benefits
- Work From Home BF contractors shall be required to work virtually ("work from home") and securely (maintaining the highest level of security), using your own secured wifi services/network and cloud based applications.
- All cloud based applications shall be determined by BF.
- For enhanced security, BF requires that Contractors shall work from their own device using Apple Mac devices ONLY (MacBook or desktops).
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
information security architectureinformation security policiessecurity technologiesnetwork designsecurity risk managementsystem administrationnetwork administrationAgile conceptsSoftware Development Lifecyclesecurity documentation
Soft Skills
critical thinkingproblem-solvingverbal communicationwritten communicationmotivatedself-drivenmulti-taskingflexibilitydetail-orientedinterpersonal skills
Certifications
CISSP Certification