SOFTETA

Security Architect

SOFTETA

full-time

Posted on:

Location Type: Remote

Location: Poland

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Own the end-to-end security design for the Data Mesh, ensuring alignment with both internal bank policies and external regulations (DORA, ECB).
  • Evaluate current and future architectures against non-functional requirements (Encryption, Access Control, Logging). Document status, propose technical alternatives, and perform formal risk assessments for non-compliant areas.
  • Design and audit complex network segmentation, including VNETs, subnets, and firewall rules for hybrid (Cloud-to-On-Prem) environments.
  • Secure high-velocity data streams and pipelines, specifically focusing on Kafka, Data Lake, DWH, and CDC from Flexcube.
  • Develop and maintain security patterns and standards to empower product teams to build securely without constant manual oversight.
  • Provide expert guidance on the scope of penetration testing, justifying the necessity (or exclusion) of tests based on the current threat landscape.

Requirements

  • 5+ years of experience in security architecture, with a focus on complex, distributed data platforms.
  • Proven experience in designing end-to-end security architectures aligned with internal policies and external regulations.
  • Hands-on experience with network and infrastructure security.
  • Experience in developing and implementing security standards, patterns, and best practices to enable autonomous secure development by engineering teams.
  • Experience working in a regulated industry, preferably banking or finance.
  • Fluent English .
Benefits
  • Diverse and technically challenging projects;
  • Flexible working hours and hybrid or remote workplace model;
  • Flexible schedule and Agile/SCRUM environment;
  • Technical equipment which you can choose.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
security architectureencryptionaccess controlloggingnetwork segmentationfirewall rulesKafkaData LakeDWHCDC
Soft Skills
expert guidancecommunication