Information Security Architect

DrexelPhiladelphia, PA
1dOnsite

About The Position

Reporting to the Chief Information Security Officer and working closely with the campus community and outside parties, the Information Security Architect protects the people, the information, and the systems of Drexel University. Essential Functions Awareness, training and communications. Forensics, intrusion detection, incident response, and threat hunting. Vulnerability scanning and monitoring, including patch management and retirement of obsolete systems. - (Non-Essential) End-point security, including encryption at rest. Network security, including encryption in transit. Identity management. In-house software development and maintenance. Cloud computing and software contracts. Support the Chief Information Security Officer’s work on leadership, strategy, policy, risk management, disaster recovery, business continuity, compliance, external relations, and emerging technologies and threats.

Requirements

  • Minimum of a Bachelor's Degree in computer science, information systems, or a related field or the equivalent combination of education and work experience.
  • Minimum of Ten years of experience in information security.
  • Mastery of and experience with four or more of the following functions: Management of information security technologies to protect information, networks, servers, endpoints, and cloud services, e.g., firewalls, antivirus, encryption, data leak prevention, security information and event management systems, and intrusion detection and prevention systems.
  • Vulnerability and threat management.
  • Incident detection, documentation, response, and remediation.
  • Identity management.
  • Application of information security and privacy laws, regulations and guidelines, e.g., data breach state laws, FERPA, HIPAA, NIST, PCI-DSS, DFARS, and GDPR.

Nice To Haves

  • Master’s degree in a related discipline greatly preferred.

Responsibilities

  • Awareness, training and communications.
  • Forensics, intrusion detection, incident response, and threat hunting.
  • Vulnerability scanning and monitoring, including patch management and retirement of obsolete systems.
  • End-point security, including encryption at rest.
  • Network security, including encryption in transit.
  • Identity management.
  • In-house software development and maintenance.
  • Cloud computing and software contracts.
  • Support the Chief Information Security Officer’s work on leadership, strategy, policy, risk management, disaster recovery, business continuity, compliance, external relations, and emerging technologies and threats.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service