Director, Information Security Architect
United States
Applications have closed
- Collaborate with the company’s IT and Site Reliability Engineering (“SRE”) teams to ensure security controls integrate and operate seamlessly with current corporate and AWS cloud infrastructure and systems.
- Analyze business information security, privacy and compliance posture to identify and remediate security vulnerabilities and threats.
- Collaborate with the company’s IT and SRE teams to conduct security assessments and penetration tests to identify and remediate infrastructure and applications vulnerabilities.
- Oversee the implementation and configuration of security technical solutions and operational processes.
- Working with the company’s Chief Information Security Office (“CISO”), develop and operationalize security policies and procedures.
- Security Architecture Design: The ISA working with IT, SRE and R&D teams to conduct Security Technical Reviews (“STR”) to interpret security vulnerabilities analysis into actionable remediation plans. This involves designing and implementing secure network architectures, cloud service and deployment architectures, applications security functional requirements, identity and access management architectures, and associated access controls to mitigate security threats.
- Threat Analysis: The ISA working with the company’s Managed Security Service Provider (“MSSP”) to monitor, analyze and manage security vulnerabilities and emerging security threats.
- Security Operational Readiness: The ISA working with the MSSP’s security operations team, IT and SRE teams to document and implement managed defense response procedures (“runbooks”) to streamline security operations event triage, notification and escalation processes.
- Managing the company’s security Risk Registers: The ISA working with IT and SRE teams to proactively manage the company’s corporate and product infrastructure and applications security risk register. This includes:
- Maintaining a comprehensive and accurate inventory of the company’s hardware, software, applications and information assets.
- Through continuous monitoring of infrastructure and applications threats and vulnerabilities, identify, analyze, assess and develop risk mitigation responses and strategies.
- On a monthly basis, documenting and communicating the company’s infrastructure and applications security risks, identifying risk impact and likelihood, developing risk mitigation plans and assigning risk mitigation technical owners.
- Schedule monthly reviews with the company’s Quality Management, IT and SRE leaders to organization to ensure transparency of identified security risks.
- Required Certifications: CISSP or CISA certified
- Deep knowledge of IT and cloud infrastructure, platform and security systems, including network, IDS/IPS and Web Applications Firewalls.
- Deep knowledge of operating systems, applications and database security methods.
- Strong understanding of the ISO27001:2022 information security management framework and associated organizational and technical controls.
- Hands-on experience working with MSSPs.
- Hands-on experience configuring and managing a Rapid7 SIEM.
- Working knowledge of security testing tools BurpSuite, SonarQube, Nessus, Prowler and AWS ECR.
- Working knowledge of threat detection platforms CrowdStrike, AWS SecurityHub, GuardDuty and Inspector.
- Excellent analytical and problem-solving skills.
- Effective communication and interpersonal skills.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AWS Burp Suite CISA CISO CISSP Cloud Compliance CrowdStrike Firewalls IAM IDS IPS ISMS ISO 27001 Monitoring Nessus Privacy R&D Security assessment SIEM SonarQube Threat detection Vulnerabilities
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open CEH-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open SQL-related jobs
- Open PowerShell-related jobs