Security Architect Architecture - Chicago, IL at Geebo

Security Architect

Job Title:
Security Architect Primary Location:
Rosemont, IL - Hybrid in office two days a week.
Position Type:
Direct hire Overview TalentFish is casting a line for a Security Architect.
This is a hybrid onsite direct-hire role in Rosemont, IL.
This is a technical leadership role, reporting into the Deputy Chief Information Security Officer.
We are searching for candidates who have experience in Financial Services or heavy tech industry experience.
You will be tasked with helping mature the security program.
Responsible for developing, reviewing, and guiding information security solutions across all business units.
You will work with business leaders, infrastructure and development organizations, and risk and governance, Driving the integration of information security controls into business and technology processes.
You will be threat modeling products and services, identifying risks and participating in architectural reviews of products in internal development and 3rd party providers.
Qualified candidates will be able do architectural reviews focused on enterprise projects specifically - SaaS and PaaS.
Cloud experience can work but this position is not related to IaaS (infrastructure as a service).
This role requires a solid understanding of various InfoSec domains such as data security, identity and access management, application security, API and encryption.
WHAT YOU'LL NEED:
Bachelor's degree in Computer Science, Cyber Security or similar degree, 5-8 years of professional experience Experience with PaaS and SaaS Core Qualifications (Required) Experience in designing and building security architecture and engineering environments on an enterprise level Experience with secure architecture principals, secure SDLC, security device installations, configuration, and troubleshooting (e.
g.
, firewall, IDS, etc.
) Knowledge and applied a subset of common Industry Standards (ISO27001/2, NIST, COBIT, CIS, DISA, FIPS) and Industry Regulatory Standards such as SOX, PCI, GDPR.
In-depth familiarity with security policies based on industry standards and best practices Knowledge of a broad range of security technologies Advanced technical writing skills Ability to lead and communicate efficiently within an enterprise level environment One or more of the following certifications or a willingness to acquire within 6 months:
CISSP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP, CSSLP, CCSP, CISA, or CISM WHAT YOU'LL DO:
Understand, research, and help design and implement security solutions with product and services offerings across all business units, driving security architectures and supporting a security strategy tailored to enterprise needs Guide in the development and validation of authentication & authorization security configurations when applicable to applications, 3rd party SaaS and PaaS platforms, and integrated multi-vendor environments Adapt hands-on approach with products and services implementation to define and deliver information security requirements and architectural solutions Develop and deliver product security roadmaps to support the progression of information security services Serve as a subject matter expert on cloud technologies and security with responsibilities to ensure enablement of robust security controls Recommended Skills Api Application Security Architecture Certified Information Security Manager Certified Information Systems Security Professional Cloud Technologies Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3s06g6b6ybpzs1xlkf', 'ExternalApply-j3s06g6b6ybpzs1xlkf'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.