Information Security Architect

Security, Architect, Consulting, Access, Java, J2EE, API, SQL, Oracle, Windows, UNIX, Linux, Network, Systems, CISSP, Manager, Architecture, Engineering
Full Time
Work from home not available Travel not required

Job Description

Zenmonics is seeking an experienced and accomplished Information Security Architect. Please review the responsibilities, technical qualifications and preferred skills below and apply if your skills fit.

    • Assist development team to design, build and implement enterprise-class secured web applications
    • Align standards, frameworks and security with overall business and technology strategy
    • Identify and communicate current and emerging security threats
    • Design security architecture elements to mitigate threats as they emerge
    • Create solutions that balance business requirements with information and cyber security requirements
    • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
    • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
    • Train users in implementation or conversion of systems
    • Scan the product using tools, scripts and techniques before every delivery to identify vulnerabilities and report them to all the stake holders

Required Technical Skills
    • Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.
    • Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
    • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
    • Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
    • Identifying security gaps in applications deployed on Docker containers on-prem or in the cloud
    • Tighten the security of web deployments on Kubernetes (Role Based Access Control, Service Account,Cluster Role Bindings, etc)

Experience with and knowledge of
    • Java/J2EE, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.
    • Windows and UNIX
    • Penetration testing tools like Burp Suite, OWASP ZAP and the likes
    • Writing code to exploit web application vulnerabilities
    • Linux Kali and its usage to identify vulnerabilities
    • Network and Infrastructure security

General skills required
    • Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
    • Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
    • Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
    • The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background

Certifications preferred
    • Certified Information Systems Security Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Certified Information Systems Auditor (CISA)
    • Information Systems Security Architecture Professional (ISSAP)
    • Information Systems Security Engineering Professional (ISSEP)
    • Certified Ethical Hacker (CEH)
Dice Id : 10338333
Position Id : 1786581257
Originally Posted : 2 months ago
Have a Job? Post it