Manager Security Architecture

DXC IND Chennai - Olympia Tech park (CSC location)

DXC Technology

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.

View all jobs at DXC Technology

Apply now Apply later

Job Description:

Essential Job Functions

  • Design and implement cloud security strategies and policies that meet DXC IT needs
  • Define and drive DevSecOps model into the automation of Azure/AWS environments of cloud workloads deploy
  • Implement methods to manage cloud compliance with tools like Wiz.io, by aligning with DevSecOps and shift-left security
  • Securing workloads migrating into multi-cloud by aligning with Data Center exit strategy
  • Conducting regular security assessments for applications to identify vulnerabilities and develop plans to address them.
  • Collaborating with other DXC IT peers, including Enterprise Architects, Cloud Ops, Network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes.
  • Staying up-to-date on the latest cloud security technologies, trends, and best practices.
  • Research AI/ML services in the cloud and for the cloud and design strategies for adoption securely.
  • Designs audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes recommendations for preventive measures as necessary.
  • Assesses assigned system to determine system security status. Designs and recommends security policies and procedures to implement; ensures compliance to policies and procedures.
  • Evaluates highly complex security systems according to industry best practices to safeguard internal information systems and databases.
  • Leads investigations of security violations and breaches and recommends solutions; prepares reports on intrusions as necessary and provides analysis summary to management.
  • Provides product recommendations of security packages to customers; Reviews vendor products and makes recommendations as appropriate. Conducts cost analyses to determine the feasibility of new products for clients.

Basic Qualifications

  • Bachelor's degree or equivalent combination of education and experience
  • Bachelor's degree in computer science, management information systems, or related field preferred
  • CISSP certification and cloud (AWS, Azure) Certifications preferred
  • Nine or more years of experience in computer science, management information systems, or data security experience
  • Experience working with information security practices, networks, software, and hardware
  • Experience working with computer programming
  • Experience working with operating systems
  • Experience working with computer desktop packages such as Microsoft Word, Excel, etc.
  • Experience working with security architecture, and cloud security

Other Qualifications

  • Strong analytical and problem-solving skills for resolving security issues
  • Good organization skills to balance work and lead projects
  • Basic leadership skills to effectively mentor and lead junior-level personnel
  • Good interpersonal skills to interact with customers and team members
  • Strong communication skills to interact with team members and support personnel
  • Strong skills implementing and configuring networks and network components
  • Ability to work with relational databases
  • Ability to work in a team environment

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: Audits Automation AWS Azure CISSP Cloud Compliance Computer Science DevSecOps RDBMS Security assessment Strategy Vulnerabilities

Region: Asia/Pacific
Country: India

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.