Data Security with Protegrity Tokenization

Overview

Remote
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - 6 Month(s)

Skills

Protegrity Tokenization
Data Security
data classification and leakage prevention
PKI
cryptography
database masking
tokenization
data governance
encryption and obfuscation

Job Details

Job Title: Data Security - Protegrity Tokenization

Location: Remote

Duration: 6+ Months

Position Overview:

Candidates must have prior experience designing and integrating diverse data security technologies, managing complex system interfaces, and developing secure architectures. The successful candidate will work closely with program and account teams and customers to identify and shape near-term and long-term roadmaps, architectures, and requirements. This position will be responsible to lead a high-performing team of Cyber Security Architects and play a significant role in implementation partner’s efforts to expand its portfolio across the Cyber services market.

This person also will participate in briefings, training, and thought leadership activities.

Key Skill Areas:

Data Security Architecture

  • Assessment - to determine the strength of the foundations for data security within organizations and to ensure that their vision, strategies, processes, people and technologies are aligned and organized effectively to optimize Cyber Security in support of their business goals.

Design & Implementation

  • To design and build security into organizations from ‘top to bottom’ so that it can be justified, and from ‘bottom to top’ so that it can be seen to be complete.

Technical Security Architecture

  • Assessment – To assess organization’s security posture against governing regulations to identify security weaknesses related to data protection and ability to define control requirements
  • Design & Implementation – to formulate & communicate new architectures and demonstrate their suitability in mitigating relevant Cyber threats.

Security Leadership & Management

  • Planning, managing and organizing the delivery of Security Architecture to clients. Assisting with the development of the Security Architecture Practice within the firm.

Security Transformation (and Security in Transformation)

  • Working in large scale transformation programs, that involves assessment the problem statement, defining the solution, technology evaluation, solution implementation in the area of database protection and management.

Communication & Influencing

  • Working with senior stakeholders, utilizing Security Architecture methods and collateral to influence their decisions.

Desired Experience & Qualifications:

  • 14 or more years of experience with bachelor’s degree required.
  • A track record of previous Cyber Security consulting experience, working on complex business-facing client problems.
  • Experience of relevant technologies (such as data classification and leakage prevention, PKI, cryptography, database masking, tokenization, data governance.) and how to securely implement them.
  • Solid experience in establishing data access governance program to help customer with classifying their information and enforcing security controls.
  • Experience in protecting database environment using technologies like tokenization, encryption, and obfuscation.
  • Prior Exposure to implementation of data security products such as Protegrity, Delphix, Guardium, Imperva, Thales, MicroFocus, BigID will be an added advantage.
  • Excellent communication skills – both oral (for interviews/meetings, presentations) and written (for designing and writing engaging reports which communicate findings succinctly and clearly convey the message in a way which is appropriate for the audience and rooted to the client’s needs).
  • Experience of business development or sales, including leading bid teams, and experience of writing winning proposals and RFP responses.
  • Cyber Security related qualification(s) such as CISSP, CISM is good to have but not mandatory.
  • A good understanding of security methodologies, best practices, and industry standards.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.