Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures).
Conduct or facilitate threat modeling of services and applications.
Design and deploy enterprise technical security services such as SIEM, DLP, PKI, IDS/IPS, and enterprise authentication/authorization frameworks and models.
Perform requirements analysis and the development of use cases, architectural views (e.g. conceptual, logical, and physical), reference models and architectures, architectural principles, and architectural patterns.
Present technical concepts to a non-technical audience.
Create an approach for addressing the specific architectural, design, or process challenges.
Interview personnel to understand current operations and areas for improvement.
Research available state-of-the-art technologies and solutions.
Create white papers and presentations on the proposed solutions.
Provide technical briefings to leadership.
Participate in various forums, and create meeting reports, recommendations, and feedback as directed by leadership.
Requirements
Bachelor’s degree in Information Technology/Computer Science or related field and 7 years of experience in the information security field with expert knowledge of applications, cloud and mobile security, platforms and infrastructure.
High School Diploma / GED or equivalent and 11 years of experience in the information security field.
ITIL Foundations certification required within 6 months of the position start date.
Highest level of experience in security operations, cyber security tools, intrusion detection, secure networks and current state-of-the-art cybersecurity technologies, standards, policies, procedures.
Knowledge of Regulations, Standards and Frameworks, including HIPAA/HITECH, HITRUST, SABSA, Zachman, TOGAF, NIST Cybersecurity Framework, ISO 27001/2.
Strong analytical, administrative, presentation, and project management skills.
Strong communication skills (both written and verbal).
Ability to work independently.
Ability to conduct a gap analysis of current versus desired capabilities.
Advanced knowledge of networking/distributed computing environment concepts.
Advanced knowledge with complex domain structures, user authentication mechanisms, and cryptography.
Knowledge of intrusion detection and data correlation.
Knowledge of network topology and the underlying OSI model.
Understands principles of client/server configuration.
Understands enterprise risk management frameworks and principles.
Benefits
Tuition reimbursement
Continuous learning opportunities
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.