0% found this document useful (0 votes)
170 views2 pages

Security Architect Job Description

This job posting is for a senior security architect position. The responsibilities include analyzing potential security projects, designing security architecture and solutions, documenting security decisions, and keeping up with emerging technologies. The ideal candidate has 5+ years of experience in both security and IT architecture. They should have strong communication skills to explain technical security topics to non-technical audiences. A degree in IT or security is required along with security certifications. Technical skills listed include cyber security, identity and access management, cloud security, and network security technologies.

Uploaded by

asdfadsf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views2 pages

Security Architect Job Description

This job posting is for a senior security architect position. The responsibilities include analyzing potential security projects, designing security architecture and solutions, documenting security decisions, and keeping up with emerging technologies. The ideal candidate has 5+ years of experience in both security and IT architecture. They should have strong communication skills to explain technical security topics to non-technical audiences. A degree in IT or security is required along with security certifications. Technical skills listed include cyber security, identity and access management, cloud security, and network security technologies.

Uploaded by

asdfadsf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Senior Security Architect

Responsibilities  

 Analysing the potential path forwards for projects affecting the security echo-system  
 Translating new security initiatives into project end-to-end architecture and roadmap considering the target architecture and non-functional requirements.  
 Designing and documenting solutions, considering functional and non-functional requirements such as availability, performance, scalability, and security  
 Identifying information risks about confidentiality, integrity, availability, and quality along with proposing and elaborate mitigating measures.  
 Supporting other Architects (application, infrastructure, DevSecOps, cloud etc.) for the security aspects within their disciplines  
 Documenting architectural decisions and writing high level designs  
 Participating to the security roadmap definition  
 Keep track of the evolution of the security solutions market / Research emerging technologies in support of security integration solutions 

Profile

 Top down and bottom-up approach to security  


 You have an IT or security master’s degree or equivalent by experience.  
 Security certifications is a plus.  
 Working knowledge of network infrastructure including switches, routers, IP configuration, CCNA or equivalent certification preferred. Equivalent work experience
may be considered in lieu of certification 
 Min 5 years’ experience in the security domain is a plus  
 Min 5 years’ experience in IT architecture/design is a plus.  
 You are good at identifying security flaws/risks in IT solutions and know how to deal with these.  
 You have strong communication skills and can convince others by your involvement, assertiveness, and accessibility.  
 You design solutions, considering the customer’s needs and the risks for the organization.  
 You dare to take decisions in complex situations.  
 You are a problem solver, focused on simplicity and efficiency.  
 You are keen to contribute to the development of a new discipline.  
 Able to make complex technical topics understandable for non-technical people  
 Excellent command of English.  

  
Technical Skills  

 Cyber Security, SOC 


 Identity Access Management (IAM),   
 Enterprise Security Architecture models,   
 Cloud Security models (ideally AWS),   
 DevSecOps,   
 Data & Storage Security,   
 VMWare ESX, KVM,  
 SIEM (SPLUNK, ELK)  
 PKI solutions (e.g., HSM, EBJCA Primekey, Vormetric)  
 Encryption and KMS  
 Network security (Firewall, boundary network protection, VPN’s,)  
 VAPTs 
 Software Defined Network (SDN) (CISCO-ACI) 

You might also like