Cybersecurity Architect

Wrocław - Office

Fresenius Group

View company page

THIS IS A REMOTE POSITION REQUIRING FLUENT ENGLISH SPEAKING SKILLS.

The Cybersecurity Architect is responsible for the integration and development of standards, processes, tools, technologies, and security service offerings. This individual will leverage leading-edge technologies, and innovative approaches to position Fresenius Medical Care for measurable success, improving efficiency, increasing security posture, supporting aggressive growth, and improving the organization’s overall cybersecurity posture.

The right candidate must have excellent engagement and communication skills and must have a strong customer-focused, team-oriented, approach that balances security needs and user experience to provide best-in-class security to the organization with subject matter expertise in enterprise security architecture governance and industry standard cyber security frameworks, cloud computing, and cloud architecture.

PRINCIPAL DUTIES AND RESPONSIBILITIES:

  • Work closely with engineering, operations, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
  • Assess and understand the organization’s current security posture and future architecture requirements, providing recommendations for improvement and risk reduction.
  • Ensures implemented solutions support cybersecurity architecture objectives (availability, scalability, performance, security, etc.), as appropriate, and monitors implementation activities to ensure architecture and design principles are upheld.
  • Supports the implementation of technical artifacts (frameworks, standards, and repeatable patterns, etc.) that constitute the enterprise information security architecture and solutions and work with infrastructure teams to ensure adoption.
  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and security policies, industry regulations, and best practices.
  • Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance within those guidelines.
  • Participate in the design and implementation of a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.
  • Contribute the creation of security policies, access controls, and authentication mechanisms based on Zero Trust principles.
  • Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.
  • Familiarity with OWASP, SANS Top 20 and prevention/remediation techniques and their implementation.
  • Ability to work in a group development environment as an application security engineer across software engineer, QA engineer and build/test/release engineer teams.
  • Experience in deploy/maintain/support/analyzing DAST/SAST scan result
  • Manage the tactical execution of short- and long-term objectives through the coordination of activities with a direct responsibility for results, including costs, methods, and staffing.


 

PHYSICAL DEMANDS AND WORKING CONDITIONS:

  • The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

SUPERVISION:

  • None

EDUCATION:

  • Bachelor's degree in management information systems, Computer Science, or business/science related field required.

EXPERIENCE AND REQUIRED SKILLS:  

  • 6-10 years of experience working with internal/external audits or risk management - methods and techniques for the assessment and management of risk.
  • Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered.
  • Strong understanding of network architecture, protocols, and security technologies.
  • Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.
  • Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.
  • Ability to operate as a pro-active and result-driven problem solver with excellent analytical and interpersonal skills.
  • Ability to understand IT processes, management objectives risk appetite and tolerances and impact of objectives, of changes to risk profiles.
  • CISA, CISSP, CRISC, or other relevant certification(s) desired.
  • Strong client services orientation and communication skills coupled with a high sense of urgency to keep appropriate partners informed, including solutions to overcome obstacles to deliver to expectation.
  • Experience in IT governance, risk, and controls, including governance frameworks.
  • Demonstrated technical writing, communication, and presentation skills.
  • Ability to work effectively in a team environment. 
  • Creativity in addressing technical challenges. 
  • Proven record to deliver results.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Audits AWS Azure CISA CISSP Cloud Compliance Computer Science CRISC DAST GCP Governance ISO 27001 NIST OWASP Risk management SANS SAST Vulnerabilities Zero Trust

Regions: Remote/Anywhere Europe
Country: Poland
Job stats:  7  0  0
Category: Architecture Jobs

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.