Sign In
 [New User? Sign Up]
Mobile Version

Cyber Architect

Mumbai, MH
Job Code:
  • IT
Applying for this job will take you to an external site
  • Shortlist
  • Email Friend
  • Print

Job Details

Lead security architecture/design reviews and assessments for multiple projects, based on requests from various stakeholders, delivery managers, and additional requestors Capture, document, and prioritize identified risks and associated threat models for technical and non-technical stakeholders, which spano Infrastructure provisioning, configuration, and (security) operational requirementso Identity & Access Management (Authentication, Authorization, Auditing)o Network Security (provisioning and architecture of components such as firewalls, IDS, etc., policy management, process for enabling analytics)o Application Security (Middleware, sessions, secure code, vulnerability assessments, penetration testing, encryption) Develop, review, audit, and update security reference architecture / security blueprints utilizing an analytical, threat-centric approach that identifies potential attack surfaces, and likely attack vectors Strategic assessment and evaluation of security solutions (network security components, host/endpoint management tools, security analytics solutions) for adoption, deployment, and/or customization across the organization Participate in governance & compliance processes relating to IT, Network, and Operations security domainsExperienceRequired Experience with IAM solutions, deployments, and technologies (SAML, Kerberos, LDAP/AD, etc.) as well as encryption mechanisms, key management, and practical deployments Experience with solutions/technologies for host-based security, OS hardening, DLP, and endpoint monitoring / patch management Experience with Firewalls, IDS/IPS, VPN, and other network security components from an evaluation, deployment assessment, and audit perspective Vulnerability Assessment, Penetration Testing, and Threat Modeling background with experience using numerous tools/technologies/methodologies Knowledge and experience in designing database and data lake architectures Working knowledge of mainstream development languages (e.g. C/C++, Java, Ruby, Python, etc.) and an understanding of associated vulnerabilities Detailed knowledge and experience of application, network, and platform vulnerabilities; ability to explain these to technical management Proactive approach toward engaging with stakeholders, undertaking security architecture/design reviews, and documenting all findings Ability to handle multiple concurrent assessments, formulate and adhere to timelines and deliverables Ability to articulate technology/business risks to technical and non-technical audiences 7+ years of relevant work experience, including client-facing roles and working with large organizationsDesired Experience with asset discovery and security analytics Knowledge and experience with cyber kill chain, defense in depth, and similar concepts Knowledge and experience with various standards (PCI/DSS, SOX, HIPAA etc.) Bachelors in Computer Science or equivalent degree/work experience CISSP, CISA, SANS GCIH or GCFA, CISM, CCSK certifications a plusKey SkillsCertificate management,PKI,X.509 certificates,firmware signing,Devices security,IAM
Degree: M.Com. (Commerce) | M.Pharm. (Pharmacy) | M.Sc. (Science) | MA (Arts) | MBA/ PGDM | MCA/ PGDCA

Additional Degree: BE/ B.Tech (Engineering)

Experience: 8-10


Network Administration | Software Engineer | System Analyst/Tech Architect | System Security
Applying for this job will take you to an external site


© Copyright 2015 Al Nisr Publishing LLC - powered by Gulf News