Position: Enterprise Security Architect,
Location: Deerfield, IL,
Duration: Full Time
Job Description:-
Core Responsibilities:-
• Provides expert technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions.
• Acts as an internal consultant, advocate, mentor, and change agent.
• Viewed as an Information Security expert and critical technical resources across multiple technical areas and business segments.
• Partners with other groups to ensure solid, cross-functional decisions are made as a team.
• Maintains and demonstrates a strong understanding of enterprise systems, policies, standards, regulatory requirements, and business drivers.
• Represents Information Security at enterprise review meetings.
• Adheres to and promotes compliance to Information Security policies, standards and best practices.
• Leads process improvement and risk mitigation initiatives.
• Coaches and mentors more junior staff.
• Will be responsible for Solution Design, creating Implementation Plan with detailed task list, Implement and integrate the solution as per the customer requirements.
• Should convert business requirements into Technical Solution and create HLD and LLD documents.
• Conduct PoCs for design approaches in order to get Solution tested for successful implementation.
• Seek opportunities to improve security effectiveness through the utilization of automation and technology innovation.
• Ensure security related systems are maintained to known configuration baselines in support of organizational security profiles.
Knowledge / Skills / Abilities:-
• Seasoned experience within a similar role.
• Familiarity with configuration and maintenance management
• Excellent documentation skill to create HLD, LLD, Test cases (Gating Criteria), checklists at various stages, Process Documents and SOPs, etc.
• Excellent communication skills to provide customer presentations and find out suitable solution to various technical requirements.
• Capability to articulate problem statement / Issues and coordinate with product vendors, TAC, Customers, Vertical teams other Project teams.
• Familiarity with security technologies including;
a. Firewalls like Cisco, Checkpoint, and Juniper
b. Web Application Firewalls
c. Intrusion Detection or Prevention Systems (IDS/IPS),
d. Application Security Module of F5 Load Balancers.
e. Patch and Vulnerability Management tools
f. Firewall Compliance tools
g. Proxy servers
h. DDoS
i. Security Incident & Event Management Systems (SIEM)