Experience:
5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
2/1/2018
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Enterprise Security Lead Architect
Request Technology - Anthony Honquest | Bensenville, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Prestigious Firm is seeking and Enterprise Security Architect to act as a Lead for the organization. The Enterprise Security Lead Architect is a critical part of the overall Enterprise Security department who is accountable for ensuring all Enterprise class technology solutions are implemented and maintained in accordance with security best practices and organizational requirements.

The team will advocate, design, and implement processes and technology relating to security risk and access control across the Enterprise organization; collaborates with the Information Risk group and Audit Group to identify & prioritize risk components, technology audits and compliance issues.

The Enterprise Security Architectural role is broken into three key areas, candidates who embody one or more of the following are encouraged to apply:

  • Secure Application Coding: DevSecOps experience with Static and Dynamic code scanning technologies, Web Application Scanning (WAS) experience and OWASP Top Ten proficiency.
  • Identity and Access Management: Security Architecture experience in Federation Services, Directory Services, Governance Reporting and Identity management.
  • Cyber Security Specialist: Security Architecture experience in secure infrastructure, data base, Pen testing, vulnerability programs and general cyber best practices.

Role Specific Responsibilities

  • Recognizes and identifies potential areas where existing security policies and procedures require change, or where new ones need to be developed, especially regarding future business expansion.
  • Ensure that security configurations of key systems are properly implemented, monitored and reported.
  • Ensure the IS organization is aware of their responsibilities and accountability for compliance with Security policies.
  • Conduct risk assessments in new and existing technologies.
  • Provide information risk management consulting to technology teams.
  • Evaluate and recommend security software/hardware and its application.
  • Establishes alternative security measures if needed to support audit findings, known vulnerabilities, or disaster recovery efforts.
  • Ensure technology teams are made aware of security engineering and architecture projects that could be incorporated into business solutions.
  • Lead security investigations and provide forensics services in responds to security incidents.
  • Ensure compliance with local regulations eg local encryption regulations and privacy laws.

Qualifications

  • College degree in related technical/business areas preferred
  • 10-12 years relevant work experience preferred
  • Well rounded understanding of technology, operations and key business processes.
  • Member of SANS or other leading security organizations
  • Strong organization skills
  • Strong change management skills
  • Highly flexible and able to adapt to change
  • Strong problem solving and analytical capabilities
  • Excellent written and verbal communication skills
  • Strong influencing and negotiation skills

Relevant Technical Skills

  • Information Risk Management: Content filtering technologies, application Firewalls, vulnerability scanners, LDAP, forensics software, security incident response, Identity Management (IdM), Federation Services, Directory Services, CASB, XaaS Security OWASP Top Ten to name some.
  • O/S: Linux (Red Hat, SUSE), Windows (2000/XP2003 Server), and UNIX.
  • Network: Firewalls, Proxy Servers, Reverse Proxy Servers, IPS, and SEIM.
  • Software Languages: Perl and Shell
  • Standards & Methodology: ITIL, COBIT, SOX, and PCI.
  • Office Automation: Word, Excel, and Outlook.
  • Planning & Design: Microsoft Project and Visio.

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Anthony Honquest. This page is not endorsed by or affiliated with Request Technology - Anthony Honquest. For questions regarding company profiles, please email: care@aftercollege.com.