Security Architect

Company Name:
SunGard
# Description
About the Position:
The Information Security Architect will act as an internal security advisor for the Business. The Architect will define security architecture design standards and provide direction amongst various groups within the Business around development of patterns and practices that map to these standards. More specifically, the Architect will continuously examine design and systems to improve the security of services produced by the Product Development Teams.
Responsibilities:
Provide leadership in the planning, research, design, implementation, and support of security applications and associated hardware platforms (e.g. intrusion detection systems, security assessment systems, etc.) used to secure Business information resources
Provide leadership to ensure computer systems security issues are addressed effectively for all systems components
Technical product management for ensuring security requirements on all aspects of launching a service, vendor negotiation and selection, product upgrades, etc
Manage and apply security attributes to any process associated with Cloud, network security and other offerings
Install, maintain, configure, monitor and support security related hardware and system security components
Investigating and reporting on security threats, violations and other security incidents to appropriate levels of management; conducts post-event reviews of security incidents and actions not in compliance with processes
Monitor network communications for security issues as authorized
Prepare long and short-range plans for security systems maintenance, production activities and upgrades for necessary support resources
Maintain professional relationships with customers, management, colleagues and vendors and deliver high-quality service
Meet with clients/employees to determine business requirements and document specifications for engagements
Manage complex security projects and perform operational tasks
Assist in the development and maintenance of architectural standards to provide a secure foundation for future developments
Works with and train application teams on security best practices and implements validation mechanisms
Plan and recommend changes to the configuration and capacity/performance of system security components
CRITICAL COMPENTENCIES
Systems security design and architecture planning and support
Data communications networking design / architecture planning and support, specifically TCP/IP protocols for LANs and WANs and Cisco, Juniper and Checkpoint products
Microsoft Windows architecture planning and support
Unix/Linux architecture planning and support
Network Intrusion Detection System architecture planning and support
Knowledge and/or security administration of databases
Experience in a 24/7/365, multi-tiered production environment
Thorough understanding of the SDLC and project management
Ability to manage computer incident response teams
Strong skills in the following areas: effective group presentation, verbal and written communications, customer service
Ability to effectively communicate and coordinate senior business management and peers
Efficient and effective problem resolution and systems troubleshooting abilities
Excellent working knowledge of industry standards and technology
Ability to travel when requested and possession of sufficient credit to meet travel requirements of the job
EDUCATION/EXPERIENCE REQUIREMENTS
Must have industry certification (CISSP, CISM, CISA, SANS-GIAC)
Four year college degree
Strong and diverse technical background including networking, storage solutions, server infrastructure (Hyper-V), operating systems (Windows, Linux), database technologies (Oracle, MySQL), and security related to SDLC
10+ years of progressively responsible positions in Security and Infrastructure roles. Experience with vulnerability scanning and open source security tools, data encryption standards/methods
Current or Previous Top Secret Clearance preferred
Technical knowledge of web application attacks and defense strategies
Industry specific training experience
Req Number: 5047255

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.