- $60,980.00 -139,430.00/year*
23 Crestmont Cir
As a Global Security Architect, you will be responsible for the design, implementation, support and documentation of cyber and network security solutions. You will be working with a team that is responsible for security operations, end point security, network security, security monitoring, incident response and vulnerability management solutions and technologies in a rapidly changing mid-size organization. This role will apply leading practice implementations and operations of security service solutions, policies and emerging technology to meet and respond to the ever-present threat to the organization s data and infrastructure. The position will ensure that all technologies are architected appropriately, operationally ready and documented for the operational teams to execute on capabilities.
MAJOR JOB DUTIES AND RESPONSIBILITIES (List in order of importance) Design, build and implement enterprise-class security systems for varying business environments, including manufacturing and distribution environments based on leading practice, business needs and security & regulatory requirements Align solutions based on standards, frameworks and risk with overall business and technology strategy Identify, mitigate and communicate current and emerging security threats Design security architecture elements to mitigate threats as they emerge Create solutions that balance business requirements with information and cyber security requirements Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Train mentor and collaborate with the business, Information Technology functions and Information Security Teams Create processes and procedures to continuously improve the monitoring, management and posture of the corporate infrastructure from a security perspective Perform and coordinate periodic security audits and assessments for existing corporate infrastructure, web applications, solutions, initiatives, and integrations and divestitures Evaluates and recommends new and emerging security products and technologies based on existing and future initiatives
QUALIFICATIONS (Education/Training, Experience and Certifications) Bachelor s degree in Computer Science or equivalent training\\experience 5-10 years experience in an Information Systems\\Security Role Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with the business, operational information technology teams as well as the information security team and vendors Consulting and engineering in the development and design of security leading practices and implementation of security principles across the organization, to meet business goals aligned with customer and regulatory\\organizational requirements Experience in security considerations for cloud computing control, SaaS, PaaS and\\or IaaS. Areas of required experience include but not limited to interfaces, system development, security design, APIs, data breaches, authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks Identity and access management (IAM) experience in designing and implementing enterprise wide solutions Knowledgeable in Enterprise Architecture standards and practices including the ability to translate customer business needs into Network and Security standards and requirements Provides guidance, mentoring and training to the broader IS Security team Experience in the incident handling procedures and intrusion analysis models.
KNOWLEDGE SKILLS AND ABILITIES (Those necessary to perform the job competently) Relevant frameworks, standards, tools and regulations, National Institute of Standards and Technology (NIST) standards (800-171, 800-53), ISO27001/27002, COBIT, COSO, ITAR, DFARS, OWASP top 10 and others. Windows, Linux, SAP and web technologies Ability to collaborate and work with business and technology teams Requires excellent analytical and problem solving skills
ENVIRONMENTAL WORKING CONDITIONS & PHYSICAL EFFORT (Under Typical Positions) Typically works in an office environment with adequate lighting and ventilation and a normal range of temperature and noise level Minimal physical effort is required. Work is mostly sedentary but does require walking, standing, bending, reaching, lifting or carrying objects that typically weigh less than 10 lbs. Domestic and International Travel up to 10% Resolution of Incidents, routine maintenance and Go Lives may involve off hour participation
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, skills, efforts or working conditions associated with a job.
The above statements are intended to describe the general nature and level of work being performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of employees assigned to this position.
Avantor is proud to be an equal opportunity employer.
We are an Equal Employment/Affirmative Action employer. We do not discriminate in hiring on the basis of sex, gender identity, sexual orientation, race, color, religious creed, national origin, physical or mental disability, protected Veteran status, or any other characteristic protected by federal, state, or local law.
If you need a reasonable accommodation for any part of the employment process, please contact us by email at ...@avantorinc.com and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this email address.
Associated topics: identity access management, iam, information assurance, information technology security, phish, protect, security analyst, security officer, threat, violation
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.
Loading some great jobs for you...