This is a temporary position. JOB SUMMARY: Contributes to and maintains security strategies, requirements, and standards for applications and platforms. Provides in depth Technical Security guidance as the Security Subject Matter Experts (SME) for various technologies and project areas, with a heavy focus on API integration and tokenization. Ensures company security policies, standards and industry standards are communicated to program teams during the Software Development Life Cycle (SDLC) process. Able to identify gaps and work with project teams to improve security while retaining time to market, functionality and scalability. Reviews and approves Security Accreditation tasks during each of phase of SDLC. Serves as point of escalation for security issues and risks that may arise. Has a broad knowledge in areas of Security such as Cloud Computing, Application, IAM, Cryptography, Infrastructure, and Risk. CANDIDATE PROFILE Education and Experience Required: Bachelor's or master's degree in computer science, information systems, cybersecurity or a related field or equivalent experience/certification. 7+ years overall Information Technology experience with: 5+ years of Information Security experience in security engineering with experience in three or more of the following areas Conducting security reviews and identifying risks and gaps Performing security accreditations Developing security architectures and strategies Developing Enterprise security patterns Working with development teams and vendor teams for implementing compensating controls Experience in reviewing and developing Security Architectures and identifying security risks/gaps as well as mitigation strategies. Strong experience in APIs, integrations, and tokenization. This role requires SME level knowledge for these technologies. The security architect should have 3+ years combined experience in five or more of the following areas: Full-stack knowledge of IT infrastructure: Applications Databases Operating systems — Windows, Unix, and Linux IP networks — WAN and LAN Backup networks and media Containers/Kubernetes and microservices Cryptography and current cryptographic standards, including PKI Direct, hands-on experience or a strong working knowledge of vulnerability management tools Working knowledge of the OWASP Top 10 Preferred: Strong working knowledge of IT service management (e.g., ITIL-related disciplines): Change management Configuration management Asset management Incident management Problem management Ability to provide Security Requirements for areas including but not limited to; Cloud Computing, Application Development, IAM, Cryptography, and Infrastructure design and standards Ability to understand large complex integrated solutions and provide the security needed between systems Experience in developing Enterprise Security Strategies. Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services Experience designing the deployment of applications and infrastructure into internal, hybrid, and public cloud services Ability to conduct independent research Strong abilities and experience in documentation and written communication for diverse audiences Experience working with diverse and distributed global teams. Current information security certification(s), such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), ISC2 Certified Cloud Security Professional (CCSP), GIAC certifications, ITIL Knowledge of Industry Standards such as NIST Cybersecurity Framework (CSF), PCI-DSS, COBIT, CSA, MITRE ATT&CK & CAPAC, STRIDE, NIST 800-53, CIS Benchmarks, etc. Knowledge of securing technologies such as, but not limited to; SaaS services (i.e., O365, Salesforce), Application Design, Container Platforms (ie. Docker, Kubernetes), APIs, Serverless, Network Infrastructure, Operating Systems, Identity and Access Management Knowledge of SDLC (Waterfall/Agile), DevSecOps, and good understanding of the ITIL Framework Knowledge of SAFe Agile Methodologies Strong negotiating, influencing and problem resolution skills Ability to effectively prioritize and execute tasks in a high-pressure environment Ability to assess customer/client needs, creatively approach solutions, decide and influence appropriate courses of action
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees