HireTalent
Essential Job Functions
Security Architecture Development and Maintenance:
Assists the Sr. and Principal Architects with the creation of security designs and frameworks for technology systems. Monitors security intelligence sources for emerging industry security technologies, technology issues, regulatory issues and practices. Provides oversight of new development efforts to ensure adherence to security policies, standards, and reference architectures. Actively participates in decisioning processes related to adoption of new hardware and software technologies.
Advisory Services:
Provides advisory services as needed to information security teams. Utilizes planning and organization tools to develop project/action plans_network. Meets deliverable deadlines as directed.
Information Security Strategy:
Assists the Principal and Sr. Information Security Architects with the development of the annual Information Security Strategy. This includes strategy development, formalized road map documentation, and continued maintenance.
Cyber Security Tooling and Processes: Possess intermediate knowledge of company Cyber Security Tools and affiliated operational processes. Utilizes knowledge when advising to determine residual risk of identified threats or control weaknesses. Champions the use of Cyber Security Tooling through education and awareness of constituents.
Regulatory Requirements and Control Frameworks:
Foundational knowledge of regulatory bodies and corresponding compliance requirements including, but not limited to: PCI-DSS, SOX, GLBA, CCPA, GDPR. Intermediate knowledge of control frameworks including, but not limited to: FFIEC Examination Handbooks, NIST 800-53, ISO 27001. Advanced knowledge of Cyber Security Maturity Frameworks such as NIST-CSF and FFIEC Cyber Assessment Tool.
General Information Technology:
Intermediate knowledge of IT tools and practices including, but not limited to: Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management, Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management, and Cyber Securityаӡ.
Human Relations:
Ability to diffuse problematic situations and manage through conflict resolution. Utilizes soft skills such as Selective Agreement, Reflective Listening, Voice Inflection, and Empathy. Takes complex concepts and breaks aperçu into laymen’s terms or analogies that help others’ understanding. Viewed as an enabling partner that provides options or information when saying no to business or IT requests. Seen by leadership and peers as credible, trustworthy and respectful. Utilizes subject matter expertise to guide and coach less experienced team members.
Reports to: Manager or Director of Information Security
Working Conditions/ Physical Requirements: Normal office environment. As the need of the business continue to evolve, this role may be asked to work an on‑call rotation points include evenings or weekends.
Direct Reports: none
Minimum Qualifications
High School Diploma or equivalent experience in related field.
A minimum of 5-8 years of prior experience in a similar or related role (an equivalent combination of experience and education may be considered).
At least 3+ years exposure with Amazon Web Services (AWS), Microsoft Azure, Experience with architecting multi‑cloud and/or hybrid‑cloud environments.
Must have experience working across multiple large scale cloud providers, including AWS, Azure, etc.
Must be experienced in creating a strategic cyber security technology direction, aligning it with tactical activities, and communicating plans broadly across the organization.
Experience in analyzing cyber security risks and architecting security solutions.
Proven knowledge of cloud services and distributed system architecture.
Create secure patterns to simplify secure application migrations to cloud environments.
Preferred Experience
Bachelor’s degree in Engineering, Computer Science, Information Security, or a related field.
Familiarity or working knowledge with any scripting languages like JavaScript, Python, PowerShell, etc.
Prior working experience in SRE, DevSecOps, or DevOps.
Knowledge of standard continuous integration andemen continuous deployment (CI/CD) patterns and security configuration management.
Proven skills in writing and creating standards documentation for architectures, solutions, and tools.
An understanding of how application‑layer vulnerabilities affect cloud infrastructure.
Hands‑on experience with some of the following technology:
Cloud‑native security tools (Azure Security Center, AWS Guard Duty)
Industry relevant certifications or training: Security‑related certifications such as Certified Information Systems Security Professional (CISSP), AWS Certified Solutions Architect, Azure security certification, or equivalent experience.
Previous Experience with Cloud Security Posture Management Tools.
Experience working with VM, containers, and their Orchestration technology such as Docker and Kubernetes.
Top 3 Must‑Haves (Hard and/or Soft Skills)
Communication, Cyber Controls Expertise, Security Architecture and design.
PCI compliance, Audit background, IT Engineering.
Top 3 Nice‑To‑Haves (Hard and/or Soft Skills)
Degree Requirements (Experience in L רפוא degree): CISSP, CRISC, AI certifications.
Certification Requirements (Any Preferences): A security based Certification.
How many years of experience are you looking for?: 10+.
Daily Activities and Priorities What would “a day in the life” of this role look like? Working with IT partners to understand current and new solutions, how security controls are embedded, and discussing needed improvements to the IT products. Working with team members on process improvements to ensure consistent delivery of security consulting.
What interaction level with this role have the team members and hiring manager? Weekly and potentially daily interactions with team members.
What would you say is the top priority for the worker over the first few weeks/months? Learn our internal systems and standards. Begin shadowing existing team members to understand how processes are executing дол today. Transitioning to taking the lead on security consulting among IT teams.
What do you foresee being the biggest challenge in this role? Learning the complex environment that is BFH and understanding who they will need to work with across the business in order to get the needed information.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, identity, national origin, disability, or protected veteran status.
#J-18808-Ljbffr
Security Architecture Development and Maintenance:
Assists the Sr. and Principal Architects with the creation of security designs and frameworks for technology systems. Monitors security intelligence sources for emerging industry security technologies, technology issues, regulatory issues and practices. Provides oversight of new development efforts to ensure adherence to security policies, standards, and reference architectures. Actively participates in decisioning processes related to adoption of new hardware and software technologies.
Advisory Services:
Provides advisory services as needed to information security teams. Utilizes planning and organization tools to develop project/action plans_network. Meets deliverable deadlines as directed.
Information Security Strategy:
Assists the Principal and Sr. Information Security Architects with the development of the annual Information Security Strategy. This includes strategy development, formalized road map documentation, and continued maintenance.
Cyber Security Tooling and Processes: Possess intermediate knowledge of company Cyber Security Tools and affiliated operational processes. Utilizes knowledge when advising to determine residual risk of identified threats or control weaknesses. Champions the use of Cyber Security Tooling through education and awareness of constituents.
Regulatory Requirements and Control Frameworks:
Foundational knowledge of regulatory bodies and corresponding compliance requirements including, but not limited to: PCI-DSS, SOX, GLBA, CCPA, GDPR. Intermediate knowledge of control frameworks including, but not limited to: FFIEC Examination Handbooks, NIST 800-53, ISO 27001. Advanced knowledge of Cyber Security Maturity Frameworks such as NIST-CSF and FFIEC Cyber Assessment Tool.
General Information Technology:
Intermediate knowledge of IT tools and practices including, but not limited to: Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management, Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management, and Cyber Securityаӡ.
Human Relations:
Ability to diffuse problematic situations and manage through conflict resolution. Utilizes soft skills such as Selective Agreement, Reflective Listening, Voice Inflection, and Empathy. Takes complex concepts and breaks aperçu into laymen’s terms or analogies that help others’ understanding. Viewed as an enabling partner that provides options or information when saying no to business or IT requests. Seen by leadership and peers as credible, trustworthy and respectful. Utilizes subject matter expertise to guide and coach less experienced team members.
Reports to: Manager or Director of Information Security
Working Conditions/ Physical Requirements: Normal office environment. As the need of the business continue to evolve, this role may be asked to work an on‑call rotation points include evenings or weekends.
Direct Reports: none
Minimum Qualifications
High School Diploma or equivalent experience in related field.
A minimum of 5-8 years of prior experience in a similar or related role (an equivalent combination of experience and education may be considered).
At least 3+ years exposure with Amazon Web Services (AWS), Microsoft Azure, Experience with architecting multi‑cloud and/or hybrid‑cloud environments.
Must have experience working across multiple large scale cloud providers, including AWS, Azure, etc.
Must be experienced in creating a strategic cyber security technology direction, aligning it with tactical activities, and communicating plans broadly across the organization.
Experience in analyzing cyber security risks and architecting security solutions.
Proven knowledge of cloud services and distributed system architecture.
Create secure patterns to simplify secure application migrations to cloud environments.
Preferred Experience
Bachelor’s degree in Engineering, Computer Science, Information Security, or a related field.
Familiarity or working knowledge with any scripting languages like JavaScript, Python, PowerShell, etc.
Prior working experience in SRE, DevSecOps, or DevOps.
Knowledge of standard continuous integration andemen continuous deployment (CI/CD) patterns and security configuration management.
Proven skills in writing and creating standards documentation for architectures, solutions, and tools.
An understanding of how application‑layer vulnerabilities affect cloud infrastructure.
Hands‑on experience with some of the following technology:
Cloud‑native security tools (Azure Security Center, AWS Guard Duty)
Industry relevant certifications or training: Security‑related certifications such as Certified Information Systems Security Professional (CISSP), AWS Certified Solutions Architect, Azure security certification, or equivalent experience.
Previous Experience with Cloud Security Posture Management Tools.
Experience working with VM, containers, and their Orchestration technology such as Docker and Kubernetes.
Top 3 Must‑Haves (Hard and/or Soft Skills)
Communication, Cyber Controls Expertise, Security Architecture and design.
PCI compliance, Audit background, IT Engineering.
Top 3 Nice‑To‑Haves (Hard and/or Soft Skills)
Degree Requirements (Experience in L רפוא degree): CISSP, CRISC, AI certifications.
Certification Requirements (Any Preferences): A security based Certification.
How many years of experience are you looking for?: 10+.
Daily Activities and Priorities What would “a day in the life” of this role look like? Working with IT partners to understand current and new solutions, how security controls are embedded, and discussing needed improvements to the IT products. Working with team members on process improvements to ensure consistent delivery of security consulting.
What interaction level with this role have the team members and hiring manager? Weekly and potentially daily interactions with team members.
What would you say is the top priority for the worker over the first few weeks/months? Learn our internal systems and standards. Begin shadowing existing team members to understand how processes are executing дол today. Transitioning to taking the lead on security consulting among IT teams.
What do you foresee being the biggest challenge in this role? Learning the complex environment that is BFH and understanding who they will need to work with across the business in order to get the needed information.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, identity, national origin, disability, or protected veteran status.
#J-18808-Ljbffr