Logo
Seminole Gaming

IT SECURITY ARCHITECT

Seminole Gaming, Florida, New York, United States

Save Job

The Security Architect is a hands‑on team player who provides technical security guidance and leadership with the design, installation, operation, service and maintenance of a variety of information systems. This individual understands IT Enterprise Architecture and works with the business, IT and enterprise architects to ensure that security standards are created and implemented into SHRSS Enterprise Architecture frameworks and project lifecycle. This role identifies security gaps, develops controls, determines functional and non‑functional security requirements and designs solutions that meet business objectives while complying with security standards to achieve Security‑by‑Design principles based on the needs of the business and organizational security requirements.

Responsibilities

Leads the development of a strategic security architecture vision, including standards and frameworks that are aligned with overall business strategy using the current technology roadmap.

Creates security strategies to improve controls and architecture for critical security infrastructure including endpoints, mobile devices, containers, authentication and authorization, logging and threat.

Provides subject‑matter expertise on infrastructure (on‑prem & cloud), application and database.

Works with the business and IT from a security perspective – determines security requirements and infosec strategy by evaluating business strategies and requirements; researching information security standards; conducting system security, vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.

Collaborates with Dev teams in designing and continuously improving the Secure Software Development Lifecycle (S‑SDLC).

Enables and facilitates Proof of Concepts.

Maintains a deep technical knowledge of Microsoft data center technologies, including Active Directory, Office 365, Azure and Windows Servers.

Works with the appropriate teams to respond to incidents and to take charge when needed.

Migrates on‑premises workloads to the cloud.

Manages cloud environments (Azure, AWS, GCP, etc.) to ensure optimal security, performance, scalability, availability and operations.

Works with engineering for the continuous improvement of the company’s Public Key Infrastructure (PKI) systems and automations.

Reviews existing architecture, identifies design gaps and recommends security enhancements; coordinates with members of the IT and technology organization, as well as business, to plan, develop, implement and maintain compliance with Center for Internet Security (CIS) or other security configuration frameworks.

Maintains knowledge and stays up to date regarding new security technologies and integrates new technologies into security architecture design when appropriate.

Represents the security team in change control activities and ensures proposed changes are in alignment with security best practices.

Writes formal security assessments and provides smaller ad‑hoc system security reports by collecting, analyzing and summarizing data and trends as necessary.

Develops security metrics and measurement capability to demonstrate operational security posture.

Performs other security team relevant duties and responsibilities as assigned.

Qualifications Experience / Education / Certifications

Bachelor’s degree preferred in Computer Sciences, Information Technology, or related field.

Experience with container‑based orchestration (Kubernetes and similar) and microservices architecture.

Working knowledge of Zero Trust Network Architecture (ZTNA).

Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series.

At least one industry standard certification such as GSEC, Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) or other security vendor certification.

Skills

Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.

Clear ability to build strong relationships and establish trust with stakeholders at all levels.

Excellent verbal and written communication skills.

Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner.

Ability to solve complex problems in a timely manner by working with multiple stakeholders.

Ability to manage multiple tasks and work streams effectively.

Ability to follow detailed processes and procedures with a high degree of accuracy.

Customer‑focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high‑quality work product.

Experience of network design, mobile security, network and firewall security technologies and vulnerability management, scanning.

Knowledge of web application security, browser security models, and application security vulnerabilities such as the OWASP Top Ten.

Experience managing projects through the full system development lifecycle.

Multiple language abilities preferred – fluency in English (written and spoken) required.

Deep understanding of network attacks, DDoS, phishing, email protocols/security/spam, encryption, authentication, logging and log analysis, IP and device reputation and security rules and policies.

High degree of skill and knowledge in managing and partaking in incident response, Intrusion Prevention Systems, Intrusion Detection Systems, SEIM, Endpoint security solutions.

Flexibility to travel as required up to 15% overnight travel.

#J-18808-Ljbffr