FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Security Architect

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Security Architect Skills

Below we've compiled a list of the most important skills for a Security Architect. We ranked the top skills based on the percentage of Security Architect resumes they appeared on. For example, 8.8% of Security Architect resumes contained Architecture as a skill. Let's find out what skills a Security Architect actually needs in order to be successful in the workplace.

These are the most important skills for a Security Architect:

1. Architecture

demand arrow
high Demand
Here's how Architecture is used in Security Architect jobs:
  • Performed information system risk assessments, security architecture reviews and designed security countermeasures to mitigate identified security risks.
  • Developed enterprise architecture products that contribute to communicating the current and to-be architecture and meeting organizational objectives.
  • Analyze, review, customize and recommend security architectures for internal projects and initiatives.
  • Conducted security assessments, administration, and policy development on the corporate/application architectures.
  • Authored functional and technical specifications to support Eli Lilly SAP Security architecture.
  • Led in-house and 3rd-party solution security architecture assessments.
  • Provided secure architecture designs to development.
  • Developed the architecture, design and deployment of a complete Cisco NAC solution for 12 remote offices and 2 main offices.
  • Developed the architecture, design and deployment of complete Cisco NAC solution for 300 remote store locations and 1 main office.
  • Assisted the Department of Justice's Chief Information Technology Architect with the development of the department's Enterprise Security Architecture.
  • Responded to official federal government inquiries on our products and architecture and how our CDM solution could meet customer needs.
  • Provided briefings and white papers to Defense Security Accreditation Working Group (DSAWG) of DISA regarding architecture and switches.
  • Develop, design, and support corporate security framework architecture and the alignment of these programs to corporate strategies.
  • Lead the security team to install, configure and troubleshoot Oracle IDM security architecture.
  • Negotiate Dell Data Center migration controls and architecture (Dell).
  • Evaluate Architecture and provide recommendations to support high availability of TSA systems with current harware/software stack.
  • Owned platform security architecture & developed most security features in Magnet Mobile Middleware platform.
  • Secured Microsoft Exchange and both IIS and Apache architecture with ISS RealSecure Server Sensors and enterprise Norton antivirus
  • Resided on weekly architecture working groups with DISA, Army NETCOM, 5th Sig, EUCOM, and SWA.
  • Architected and implemented a private cloud/DR environment and the SAP rearchitecture for a leading mining company with Flex Pod environment.

Show More

304 Architecture Jobs

No jobs at selected location

2. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Security Architect jobs:
  • Develop secure options to meet business needs and to ensure compliance with approved security and architectural standards.
  • Worked with representatives from Federal and State government to ensure compliance with IT requirements.
  • Researched new and innovative products to ensure compliance with corporate security policies and standards.
  • Designed and implemented auditing functions to ensure compliance with OIG and NIST standards.
  • Deployed Bluecoat proxy servers to ensure compliance with Internet access usage policy.

Show More

2 Ensure Compliance Jobs

No jobs at selected location

3. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Security Architect jobs:
  • Translated business requirements/needs into security infrastructure requirements.
  • Developed host based defense methodologies while conducting research and analysis for next generation web based attacks against critical infrastructures.
  • Created customized security evaluations of potential business partners to ensure overall security and sustainability across a Critical Infrastructure environment.
  • Defined, designed and implemented an enterprise incident management process to address physical, data and infrastructure breaches.
  • Managed architecture and project to enable client to establish user management infrastructure and to select vendors.
  • Consolidated server infrastructure for Arkansas Public School Network into High Available centralized system.
  • Provided detailed documentation and recommendations on how to lock down their infrastructure.
  • Developed and implemented interface between Super Smart Card and infrastructure.
  • Identified Gaps in existing identity infrastructure of the enterprise.
  • Recommended activities and organizational infrastructure for Identity Management Architecture.
  • Designed, tested and rolled out new product releases of anti-virus into the customer's infrastructure.
  • Transitioned and maintained the Anti-Virus infrastructure for IBM's customers.
  • Completed batch design and pilot for the batch job infrastructure.
  • Managed the build and set up end-to-end security infrastructure.
  • Deployed a global replicated Entrust based PKI infrastructure.
  • Created logging and reporting infrastructure using Manage Engine.
  • Cloud systems security assessments and audits Virtual Desktop Infrastructure security assessments
  • Completed a thorough POC effort with the vendor to demonstrate value to the Axiall infrastructure team.
  • Evaluate, test, recommend and integrate new security products into Citi Bank's infrastructure.
  • Provide failover options for MQ Infrastructure across multiple data centers.

Show More

139 Infrastructure Jobs

No jobs at selected location

4. Information Security

demand arrow
high Demand
Here's how Information Security is used in Security Architect jobs:
  • Coordinated Corporate Information Security Awareness program, generating content for internal articles and training materials and presenting materials to employees/new hires.
  • Developed a comprehensive Information Security Policy, Charter, Internet usage guidelines, and Microsoft Windows NT Administration guidelines.
  • Provided guidance on Information Security-related issues across a wide variety of company-wide IT efforts and initiatives.
  • Developed information security strategies and conducted planning activities to enable Southern Company to utilize emerging technologies.
  • Defined requirements and implemented encryption standards for enterprise based upon Information Security Best Practices.
  • Identify, implement, and monitor best practices for information security architecture.
  • Identified SaaS Information Security Training solution and secured funding for implementation.
  • Compile, report and interpret information security metrics to senior management.
  • Project management of Information Security projects and corporate remediation findings.
  • Perform Information Security Assessment on Web facing Applications.
  • Represent Information Security in change management meetings.
  • Created interactive Information Security online training.
  • Ensured global employee awareness of and compliance with all NCR information security policies and standards and security best practices.
  • Identify and evaluate tools and techniques to be used for capture, modeling and analysis of information security architecture.
  • Lead for all customer and regulatory audits as they pertain to Information Security.
  • Provide ongoing training to Information Security team.
  • Stay abreast of and recommend new information security technologies as well as risk management practices to facilitate business initiatives.
  • Provide overall guidance on Information Security investigations of cyber incidents and employee misuse of company systems.
  • Developed an Enterprise Information Security Strategy and Roadmap.
  • Re-designed the IT Risk Assessments program to most efficiently gather university wide data to analyze and manage information security risk.

Show More

140 Information Security Jobs

No jobs at selected location

5. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Security Architect jobs:
  • Conducted security consulting, research, security approval and collaboration in developing and publishing of all security policies and standards.
  • Developed and documented security policies and procedures, user maintenance, activity group and role maintenance using profile generator.
  • Participated in the development of hardware, software, network security procedures and guidelines that supported information security policies.
  • Developed security policies that include PCI requirements.
  • Implemented and maintained corporate security policies.
  • Manage the development and implementation of global security policies, standards, guidelines and procedures to ensure ongoing maintenance of security.
  • Developed and updated security policies and standards to ensure they were consistent with modern threats and risks to the organization.
  • Provided architectural guidance and designs in accordance with security policies and in support of the company mission and vision.
  • Worked with Network Services to deploy baseline security policies to desktops and servers via group policy.
  • Created security policies and procedures or uploading roles from ABAP-based systems to SAP EP.
  • Oversee the approval, training, and dissemination of security policies and practices.
  • Develop, maintain and publish up-to-date information security policies, standards and guidelines.
  • Monitor and enforce compliance with established security policies, standards, and guidelines.
  • Created Security Policies and Procedures manual for the bank.
  • Developed Information Security policies, procedures, guidelines, data privacy, disaster recovery & business continuity / operation plans.
  • Employed NERC CIPS and NISTIR 7628 to produce holistic security policies and standards to ensure product development compliance throughout the lifecycle.
  • Developed and Implemented Information Security Policies and Critical Security Controls (CSC 5).
  • Helped create security policies and procedures for Ceridian.
  • Implemented Cyber Security Policies firm wide.
  • Reinforced operational efficiency via expert business process reengineering, Revised corporate security policies and processes to map against compliance requirements.

Show More

82 Security Policies Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Cloud

demand arrow
high Demand
Here's how Cloud is used in Security Architect jobs:
  • Designed and developed Security Architecture framework for Allstate DevOps offering running on Pivotal Cloud Foundry.
  • Federated SaaS Designed comprehensive compliance and security infrastructure for cloud-based, SOA.
  • Developed a cloud-computing model to demonstrate SAAS based enterprise solutions.
  • Developed requirements for new business cloud deployment.
  • Cloud security engineer for the IaaS platform to include physical and virtual assets across 70 locations with over 50K virtual machines.
  • Lead Security Architect for moving operations to cloud environments, creating and migrating to a new billing system,
  • Devise secure by design cloud architectures for private, hybrid and public facing fixed and cloud solutions.
  • Design and build the exchange protocol with RightNow deployed on Oracle public cloud.
  • Assist in planning strategies for migrating apps to AIG's private cloud.
  • Design and implement the security solution with fed certified private cloud.
  • Used IDASS provider cloud Tenant to configure the SAML Apps.
  • Design federated Identity Provider with Oracle Cloud.
  • Architected federated authentication to enable secure authentication to cloud-based solutions.
  • Developed cloud architecture initiative to leverage latest VMware/EMC technologies.
  • Implement external scanning platform in the cloud to monitor perimeter using Nessus and automated scripts.
  • Integrated the cloud Office365 with siteminder using CA Secure Proxy Server with WS-Fed.
  • Charged with providing leadership and direction for Cloud/Virtualization C & A team.
  • Integrated Cloud Clarity PPM with siteminder.
  • Advised Founder/CEO of Healthcare technology startup on business case development, Cloud and Data Security Architecture.
  • Created a custom login applications for Cloud IDASS provider APIs and Risk Minder SDKs.

Show More

244 Cloud Jobs

No jobs at selected location

7. Business Requirements

demand arrow
high Demand
Here's how Business Requirements is used in Security Architect jobs:
  • Analyze technology and industry trends to recommend cost effective solutions to address complex and unique business requirements.
  • Provided architectural direction, helped set business requirements, and conducted technical and cost review.
  • Designed, developed and presented reports/templates in a business-usable format based on business requirements using.
  • Created Organizational Structure and Positions according to business requirements.
  • Created PD Profiles According to business requirements and Assigned to users.
  • Gathered business requirements, understood functional processes and designed a scalable, flexible security model.
  • Project coordination, business requirements analysis, reviewing requirement specifications.

Show More

6 Business Requirements Jobs

No jobs at selected location

8. GRC

demand arrow
high Demand
Here's how GRC is used in Security Architect jobs:
  • Produced enterprise security regulatory crosswalk GRC tool linking existing policies to regulations.
  • Review existing Security and GRC design proposed by previous SI and recommend changes in alignment with change in functional design.
  • Assist with vision and direction for implementation of all SAP GRC compliance tools at Director and VP of compliance level.
  • Trained Basis Team members about GRC, being a private company they were currently not required to follow these procedures.
  • Single point of contact between the Financial controls Team and the Security team and Internal Audit for GRC 10.1 changes.
  • Plan and execute client engagements focusing on SAP GRC, SAP security, and audits of SAP environments.
  • Worked with internal auditor and internal control to build control frame work for GRC and other tracks.
  • Worked on SAP GRC like performing SOD checks and assigning Fire Fighter access to the users.
  • Installed and configured SAP GRC Process Control 3.0, rolled out self-assessment, and survey.
  • Re-designed all their IT and Production Support roles and made them GRC compliant.
  • Created the Security Landscape design with respect to SAP GRC tool implementation.
  • Worked on Project plan for GRC 10, 5.3 implementation & configuration.
  • Worked on GRC 10.0 configuration for EAM for a Decentralized setup.
  • Participated in Firefighter (GRC) implementation.
  • Researched GRC tools and helped with presentation.
  • Upgraded SAP GRC 5.2 to 5.3.
  • Worked on GRC Worked on NW CE 7.1 and designed Authentication and Authorizations for the Portal using Portal and Java Roles.
  • Worked as Core team member for GRC 10.0 implementation team GRC Access Controls 10.0 post installation administration.
  • Designed process for GRC SPM, and rollout to all support users for all SAP Landscape.
  • Worked to modify GRC Global rule set per Grainger requirements, added Vistex based tcode rules into GRC global rule set.

Show More

1 GRC Jobs

No jobs at selected location

9. PCI

demand arrow
high Demand
Here's how PCI is used in Security Architect jobs:
  • Create and review Security Requirements in line with PCI, SOX, ISO 17799, ISO 27001 and Best Security Practices.
  • Conducted enterprise-wide compliance assessments for Payment Card Industry (PCI) including AS/400 mainframe compliance architecture; PCI 3rd-party audits.
  • Partner with various cross functional teams to ensure compliance to industry and company standards including SOX and PCI.
  • Addressed compliance issues related to GLBA/FFIEC, PCI, HIPAA, NIST 800-30 and internal controls requirements.
  • Work closely with business leaders to maintain compliance with applicable regulations (most notably PCI).
  • Led design and deployment of IT initiatives necessary for successful PCI credit card handling endorsement.
  • Run, maintain, update, and audit quarterly SOX and PCI controls and reports.
  • Led technical PCI Compliance program across the university working in conjunction with Treasurer's Office.
  • Provided guidance and design recommendations when transitioning from PCI 2 to PCI 3.1.
  • Advised units on how to most effectively and securely satisfy PCI Compliance.
  • Implemented GLBA and PCI controls on all bank systems.
  • Conducted annual firewall reviews as required for PCI compliance.
  • Work with the client ISO for all Legal compliance such as HIPAA, FISMA, SOX and PCI-DSS.
  • Ensured Databases are in compliance with HIPAA, SOX, PCI and GLBA standards.
  • VISA CISP and PCI controls.
  • Generate and review quarterly reports for Firecall, PCI and SOX audits on AIX, HP-UX, and Red Hat machines.
  • Achieved compliance with State and Federal assessments for various State Agencies including PCI, HIPAA, NIST, FISMA.
  • Configure PCI requirement rules * Document high level architecture and write-ups of each rule created during the project lifecycle.
  • Evaluate PCI perimeter scans and coordinate with business units to remediate valid findings.
  • Provide SOX/HIPAA/NACHA/PCI and multi-state PII/SPI regulatory requirements review and compliance design for new projects.

Show More

12 PCI Jobs

No jobs at selected location

10. Security Solutions

demand arrow
high Demand
Here's how Security Solutions is used in Security Architect jobs:
  • Directed the implementation and management of the Security Strategy and Security Solutions for Allstate Agency workforce.
  • Optimized recommended data security solutions based on local requirements, regulatory compliance and regional risk profiles.
  • Assist with investigation of events; evaluating, designing and implementing security solutions.
  • Direct the operation of the organization's Information Technology security solutions.
  • Provide technical direction and design for new and existing security solutions.
  • Introduced process and governance to security solutions and identified gaps and training requirements for people needed to support the solutions.
  • Designed information security solutions to minimize risks, including fraud, business and system disruption, and execution failures.
  • Plan, design and oversee the implementation of security solutions, tools, and monitoring systems.
  • Perform Proof of Concepts with multiple vendors for new security solutions involving IT and business requirements.
  • Authored business requirements documents, which were used in the selection of new security solutions.
  • Drive the implementation of Standard and Custom Security Solutions to IT and Business projects.
  • Research, design, and implement information security solutions for the organization.
  • Worked with business units on security solutions to meet PCI DSS requirements.
  • Performed in the role of a Security Consultant and Security Solutions Architect.
  • Designed and developed security solutions for over 20 MDA enterprise sites.
  • Design and implement high-end financial security solutions for Citi Bank globally in CheckPoint Provider-1/SiteManager-1 for its centralized management of Security Infrastructure.
  • Performed Security Solution Design for pre-sales engagements to develop end-to-end information security solutions as per customer security and compliance requirements.
  • Provide effective cyber/application security solutions for web applications.
  • Author RFPs and evaluate security products to determine the best security solutions for the firm.
  • End point Security solutions like Symantec SEP and SEP Email Security.

Show More

166 Security Solutions Jobs

No jobs at selected location

11. Access Management

demand arrow
high Demand
Here's how Access Management is used in Security Architect jobs:
  • Implemented 2-factor authentication and privilege access management.
  • Key Achievements: Key player in development and design of CA's and Identity Access Management Suite, and wireless offering.
  • Worked on implementation of I AM PORTAL for Access management, roles management and Identity management from SAP Security.
  • Developed and escalation point for global support model that involved 24x7 monitoring of the Identity and Access Management infrastructure.
  • Delivered a series of Lunch and Learn presentations to security staff on the Identity and Access Management.
  • Train and mentor resources in Identity and Access Management concepts, develop training methodology and material.
  • Defined/developed the Identity and Access Management (IdAM) Reference Architecture (RA) for MHS.
  • Mentor junior staff on Identity and Access Management methodologies and provide insight to career development.
  • Worked on the users access management for FIREFIGHTER access and their approval processes.
  • Provided identity and access management architecturalsupport.
  • Architected and engineered process to identify and maintain privileged user access management.
  • Architected, designed and implemented an enterprise Identity and Access Management solution.
  • Designed Identity and Access Management solutions using Oracle toolsets; Oracle OIM, OID, OAM, OVD.
  • Implemented the identity and access management for Vantiv.
  • access management, patch management, vulnerability scanning, log management, etc.)

Show More

86 Access Management Jobs

No jobs at selected location

12. ECC

demand arrow
high Demand
Here's how ECC is used in Security Architect jobs:
  • Configured the ECC6.0 system authorization check by using the SAP delivered HR Authorization Main Switch (OOAC).
  • Analyzed and evaluated the existing system and provided TOBE approach to reduce the SoDs in ECC system.
  • Supported the upgrade to ECC 6.0 through Sandbox, Development, QA and Production upgrades.
  • Provided Guidance and helped out with Upgrade between Patch levels for SAP ECC/HR and Portal.
  • Worked on Production Support for ECC 6.0, BI 7.0 using Analysis.
  • Configured Compliance Calibrator and Firefighter on SAP R/3 4.7 and ECC 6.0.
  • Installed and configured GRC 5.3 components in ECC and 4.6C systems.
  • Managed two off-shore resources supporting ECC Security.
  • Created Role Strategy Document for the business and IT roles for ECC 6.0 and SAP HR for more than 700 roles.
  • Worked with AD and SSO for ECC and BI systems.
  • Adopted composite and single roles strategy in the place of old strategies in ECC 6.0 .

Show More

1 ECC Jobs

No jobs at selected location

13. SOX

demand arrow
high Demand
Here's how SOX is used in Security Architect jobs:
  • Conducted security audit for user access and role development by using GRC tool sets for SOD/SOX violations.
  • Conducted workshops to Business Process Owners, SOX / IT Compliance team, SAP Project functional team.
  • Worked with Audit team to redesign production Roles to meet all SOX Compliance standards and recommendations.
  • Work with the compliance team to vet solutions and designs to ensure SOX and PCI compliance.
  • Create as-is vs to-be architecture and Gap Analysis documents for NERC, SOX, and FISMA compliance
  • Worked with internal audit team to ensure compliance with SOX, HIPPA, and corporate policy.
  • Work with Legal and Records Management to ensure solutions are SOX and ISO compliant.
  • Oversee security processes and procedures to ensure they are followed with no SOX violations.
  • Gathered feedback from unit testing team and modified roles as per SOX compliance.
  • Set implementation plan for SAS70 Type 2 as precursor to SOX preparation.
  • Provided consultation services for HIPAA, PCI and SOX regulation compliance.
  • Worked on the SOX controls decision making and its implementations.
  • Analyze, troubleshoot, and/or mitigate SAP SOX/SOD issues.
  • Managed and clean the roles and compliance with SOX.
  • Developed control and strategy with focus on SOX.
  • Designed and implemented SOX database queries as related to Netweaver Security.
  • Implemented Trusted Network Technologies iManager to provide secure access for several internal applications to comply with SOX and HIPPA audit requirements.

Show More

3 SOX Jobs

No jobs at selected location

14. Governance

demand arrow
high Demand
Here's how Governance is used in Security Architect jobs:
  • Recommended architectural PeopleSoft modifications to improve performance; implemented best practices, trained customer personnel, and implemented SOA governance.
  • Implement information security governance and provide technical support and security consultation to server, network, and application teams.
  • Lead organizational changes in improving processes and governance that lead to better productivity.
  • Author market analysis and consultative findings for guiding governance & compliance initiatives.
  • Integrated policy and governance processes between the security organization and Enterprise Architecture.
  • Developed test plans on how these requirements would be met and established program governance on how these requirements would be validated.
  • Authored agency, architecture, and security governance establishing IDE as the DLA gateway for data entering and leaving DLA.
  • Identified roles for Segregation of Duties to tie with Governance Risk & Compliance (DCAA) requirements.
  • Identify and develop strategies for user provisioning and governance across the solution and into the CalPERS enterprise.
  • Lead for governance, risk management, & compliance for technology sales in North America.
  • Established agency governance for authoritative sources of DOD logistics data at DLA.
  • Teamed with Internal Audit to facilitate IT governance.
  • Assist the Security team in IT Governance.
  • Proposed a pragmatic approach to all Third Party Supplier Risk assessment using a multi-Tiered Information Security Governance Framework.
  • Focus on overall operations strategy and operate governance.
  • Worked with Security and Governance teams for the Provisioning and De-provisioning lifecycles of access and workflows

Show More

15 Governance Jobs

No jobs at selected location

15. Access Control

demand arrow
average Demand
Here's how Access Control is used in Security Architect jobs:
  • Developed Enterprise Security Architecture with integrated Role based access control and SSO.
  • Developed production system access control by utilizing Fire Fighters access.
  • Prepared and delivered access control presentation to client management.
  • Presented the benefits for implementing & stage wise GRC 10, 5.3 implementation process(Access Control & Process Control).
  • Access Control GRC: Integration ERP systems with CUP for Risk analysis for user & role provisioning.
  • Access Control GRC: Configure technical connections and design custom rule sets specific to local ERP systems.
  • Share working knowledge on SAP CRM ACE (Access Control Engine) Security model.
  • Access Control GRC: Configure role defaults feature for access requests in CUP.
  • Support the building and maintenance of role based access control roles.
  • Design and implement Access Control and Least privilege for IDM.
  • Access Control GRC: Support and administer SPM and CUP.
  • Implemented SAP GRC access control suite 5.2 with all modules.
  • Develop Enterprise Cloud Infrastructure Role Base Access Control.
  • Role-Based Access Control and Connector modules.
  • Involved in the implementation of GRC Access control 5.3 RTA (Real Time Agent).
  • Redesigned IDM, Access Control, Storage requirements and led a team of 4 to productionize system in AWS GovCloud.
  • Spearheaded the migration and transformation of the Role-based Access Control program to Identity and Access Management Lifecycle & Governance.
  • Configured and monitored Computer Associates eTrust Access Control across all UNIX systems.
  • Access Control GRC: Configured Escape routes in CUP workflows.
  • Configured and debugged TACF [Tivoli licensed Seos Access Control Database] daemons on Solaris 2.6 platform.

Show More

7 Access Control Jobs

No jobs at selected location

16. Security Requirements

demand arrow
average Demand
Here's how Security Requirements is used in Security Architect jobs:
  • Evaluated security documentation and review of engineering drawings and documentation to ensure cross-walk and compliance to security requirements.
  • Developed program security requirements enabling the development of a robust security architecture to meet DoD 8500.2 IA Controls.
  • Developed security requirements and recommended solutions for new technology projects and changes to current environments and applications.
  • Designed security systems like Retail, proxy and firewall environments to meet critical business and security requirements.
  • Define security requirements for new Cloud systems in line with the enterprise information security architecture.
  • Developed initial security requirements for all server deployments to ensure a consistent base security profile.
  • Provided security requirements analysis, threat models, asset identification, and test strategies.
  • Manage security requirements, design and implementation in Security Life Cycle.
  • Gathered end-user role security requirements through workshops with functional teams.
  • Facilitate Security Requirements Gathering Sessions.
  • Created security requirements and liaised with networks and lines of business to create an extensible, logical and physical design.
  • Teamed with other IT business areas to provide security requirements and guidance on key IT modernization efforts and projects.
  • Consult with project teams on Security Architecture and design in line with Security Requirements and Best Security Practices.
  • Conducted a security risk assessment and defined security requirements for a new Joint Venture in China.
  • Defined, Implemented and Documented Security Requirements and Roles in line with company standards.
  • Conducted workshops for functional and business teams to obtain Security requirements and sign off.
  • Created new Query Trees and Access groups to address Query Security requirements.
  • designed security requirements for Business Process Management Platform-as-a-Service built on AWS EC2.
  • Ensured systems met all security requirements making certain the systems were accredited and brought on line in an expedient manner.
  • Create security requirements for projects Creation and Execution of VA security tests cases/plans Creating and maintaining ARA artifacts.

Show More

128 Security Requirements Jobs

No jobs at selected location

17. Nist

demand arrow
average Demand
Here's how Nist is used in Security Architect jobs:
  • Designed and implemented configuration with Cisco PIX firewalls to support 3-tier architecture and protected administrative network.
  • Designed and implemented a means to decentralize security administration function across FDIC Division lines.
  • Developed queries for administrators to extract and define provisioning report from oracle databases.
  • Research and analyze wireless software and hardware industry for competitive and opportunistic situations.
  • Designed and documented security administration policies and procedures for the production environment.
  • Designed, developed and administered user roles, profiles and authorizations.
  • Performed system administration tasks for the Knowledge Management Platform.
  • Created and enforced procedures for user administration.
  • Provide administration of 30 sidewinder firewalls.
  • Advised IT security requirement solutions using NIST 800-53, DIACAP, FIPS 199, FIPS 200 and other security controls frameworks.
  • Created white papers for emerging security technology based on NIST and FedRAMP.
  • Used HP Quality Center 10 for defect resolution and administration.
  • Assess systems in regard to DIACAP and NIST 800-53 requirements.
  • Provided Risk Management Plan via NIST 800-53.
  • Provide administration of 10 checkpoint firewalls.
  • Administered SAP GRC AC 5.3 tools & its components including RAR, CUP and SPM.
  • Authored deliverable Developer and Administrator Security Guidelines.
  • Experienced with more than 1000 user administration Participated in SAP controls/reviews (Audit) with PWC and implemented later.
  • Provided security technical guidance for database administrators and software developers based off DoD STIGs, NISTs, and DIACAP.
  • Manage, develop and mentor security analysts and administrators. }

Show More

64 Nist Jobs

No jobs at selected location

18. Application Security

demand arrow
average Demand
Here's how Application Security is used in Security Architect jobs:
  • Identify and recommend Application Security issues with various open source development components as part of security code review process.
  • Developed new technology standards for several IT domains including application security, security engineering, architecture, and compliance.
  • Provided subject matter expertise (SME) for application security and cryptography domains for line-of-business Information Security Officers.
  • Partnered in the build of the application security program and assisted in performing application security assessments.
  • Reviewed, designed and developed network and application security architecture in a mid-size enterprise environment.
  • Web Application Security Analysis findings and provides remediation strategies as well as Security Thread Modeling
  • Advised lines of business on application security issues/projects, compliance strategy and encryption methods.
  • Increased organizational efficiency and improved technological system development cost by simplifying complex application security models
  • Monitored the external application security threat landscape and recommended proactive risk mitigation.
  • Plan and device strategic implementation of application security program using SAMM methodology.
  • Defined and executed the Application Security Program in Mary Kay Inc - a multinational company with presence in 37 world markets.
  • Served as the Oracle EBS Subject Matter Expert for all application security related questions on major EBS releases.
  • Work with the support unit and client leadership to determine how application security is supported in production.
  • Perform Application Security / Penetration Testing/ Code Reviews in accordance with OWASP.
  • Revamped SDLC tools and recruited application security expert to manage program.
  • Implement OWASP-10 for web application security.
  • Performed network and application security assignments using AppScan and Nessus products.
  • Published Application Security Non Functional Requirements (NFRs).
  • Perform application security testing using IBM appscan tools.

Show More

139 Application Security Jobs

No jobs at selected location

19. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Security Architect jobs:
  • Managed the Incident Response Team, with responsibility for facilitating security investigations through tactical coordination of case-specific responses.
  • Updated existing Incident Response Policy and provided user training on adhering to security best practices.
  • Developed and led the vulnerability management, incident response and the vendor management programs.
  • Prepare contingency planning and incident response teams for any unforeseen events.
  • Developed training and implementation of applicable Incident Response Process and Procedures.
  • Developed policies and procedures around Risk Management and Incident Response.
  • Establish and communicate a corporate security incident response plan and be available to lead a team through an innocent.
  • Helped develop Incident Response Plan, Analysis & Notification Procedures, and Patch Management Process.
  • Developed Incident Response Policy, Process and Procedure (Job-Aids) for V3 NERC compliance.
  • Launch and track investigations to resolution, complete incident response forms and document logs.
  • Created and led corporate Incident Response team of three analysts in security event remediation.
  • Resolved incident response activities by providing guidance, training and developing FAQ s.
  • Supported the Graduates of course in incident response, and current events.
  • Set up Computer Incident Response team to address any breach in security.
  • Change Management, Risk Assessment, Business Continuity, Incident response process.
  • Lead Cybersecurity solution delivery activities and manage forensic investigations/Incident Response activities.
  • Developed an incident response procedure and workflow in accordance with McDermott's security policies.
  • Participate in Cyber Incident Response Team calls.
  • Established and Implemented automated malware analysis network for and participated intier three computer incident response at Department of State.
  • Lead the Computer Incident Response Team, identifying and reporting on internal/external incidents. }

Show More

27 Incident Response Jobs

No jobs at selected location

20. SSO

demand arrow
average Demand
Here's how SSO is used in Security Architect jobs:
  • Perform or assist with information security assessments, vulnerability scanning, penetration testing and associated remediation (risk mitigation).
  • Identify and convincingly explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation.
  • Provide guidance for data protection based on data sensitivity and associated business risk.
  • Identified emerging vulnerabilities and evaluate associated risks and threats.
  • Developed Information Security and Networking Policies, Standards and Procedures (SSO, Web Attributes, IdM and RBAC).
  • Designed and evaluated Federation (ADFS) and SSO (Single Sign On) products and integration paths.
  • Collaborated with system owners and ISSO to create a standardized security framework for several line offices in NOAA.
  • Designed Portal security architecture, enabled SSO and tweaked authentication file to meet client's requirement.
  • Implemented SPNEGO based SSO one of the rare and very complex configuration in ISAM.
  • Participated in ED / SSO meetings to define next generation of IAM security architecture.
  • Imported SAP roles and users from SAP ABAP systems into SAP BusinessObjects Enterprise.
  • Provided technological and architectural training to the senior PCASSO staff.
  • Set up SAP system as authentication in SAP BusinessObjects Enterprise.
  • Visited the payment processor vendor for on-site risk assessment.
  • Used HTML, PHP, Java Scripts and Perl for creating Logging pages for SSO.
  • Involved in clients inbound (SP) and outbound (IdP) on-boarding for SSO.
  • Coordinated the implementation of an eBusiness identity management/single sign-on (SSO) project (using DirectorySmart from OpenNetwork Technologies).
  • Represented Program Management Office ISSO on Security Working Group to bring together efforts of TechSIGINT subprojects under security architecture.
  • Assisted with configuration of SSO using UIDPW and Logon Tickets.
  • Support the ISSO office enterprise initiatives.

Show More

2 SSO Jobs

No jobs at selected location

21. ISO

demand arrow
average Demand
Here's how ISO is used in Security Architect jobs:
  • Developed an ISO27001/27002 based information security management program and strategy, associated security policies, procedures and SDLC integration activities.
  • Performed liaison activities required to obtain process based data security requirements and translate to task requirements for technical team members.
  • Serve as a liaison between technical and sales professionals, devising customized solutions-driven strategies.
  • Led information security architecture support to CISO office for the Transportation Security Administration.
  • Develop criteria, assess, and validate security architectures models according to NIST 800-123, 800-53 and ISO regulations and standards.
  • Serve as the technical liaison for client to ensure all targets and requirements are completed on schedule, within budget.
  • Recruited to build out and support the security program for the new cloud service offering including implementation of ISO 27001:2005.
  • Supported CISO in Security Program Development, creating road maps, and integrating Information Security program with Enterprise GRC program.
  • Perform ISO and SSAE audit and certification review of all business operations ranging from sales to software development.
  • Led key project to develop an ISO27001/27002-based Information Security Management System (ISMS).
  • Develop and adopt security framework using ISO, ITIL, NIST and FedRAMP guidelines.
  • Prepared product comparisons, designed, tested and rolled out new product releases.
  • Acted as a liaison between vendors, management and technology support teams.
  • Reported directly to the Global Information Security Manager (CISO).
  • Consulted as TISO with Citicorp businesses on security-related issues and advisories (CERT, FIRST, etc.).
  • Risk assessments/treatment plans based on ISO 27001 framework, CSEG framework, and the ICO depending on the BIA.
  • Trusted Advisor for fortune 500 companies such as Sony USA, Coca-Cola, General Motors and GlaxoSmithKline.
  • Developed and managed the monthly status reporting process for the IT Security Managers and CISO.
  • Key Contributions: * Created policies and procedures needed to meet ISO Certification.
  • Architected LDAP-based AAA infrastructure for cloud hypervisors and customer VMs.

Show More

20 ISO Jobs

No jobs at selected location

22. CRM

demand arrow
average Demand
Here's how CRM is used in Security Architect jobs:
  • Provide expertise in SAP CRM Interaction center security functionality including integration with all major market CTI solutions.
  • Analyze SAP authorization assignments and segregation of duties conflicts and designing of HR, BI and CRM roles based on that.
  • Worked on Global access, custom access privileges in CRM and created custom sharing rules according to business requirement.
  • Designed Firefighter roles and business roles for business area SD, PP, PM, MM and CRM.
  • Devised implementation plan for IC-WEB access to include Business roles within the CRM, R/3, Portal environments.
  • Created CRM based roles and restricted access to perform CRUD and user specific customization operations.
  • Provided recommendations on - IDM implementation, CRM 7.0 functionality review and role design.
  • Worked on creating security roles from CRM business roles for a mini CRM project.
  • Worked with the CRM functional team to identify CRM authorization objects for IC roles.
  • Worked on CRM project to create and design the security of CRM roles.
  • Worked Extensively on SAP CRM and SAP Solution Manager Security.
  • Designed Security Strategy for ECC (including HR), EP, BI, PI, CRM, SRM and SCM.
  • Experienced in trouble shooting issues in R/3, ECC, BI, HR, CRM, SCM, SRM systems.
  • Worked on RFC connections setup between the HTCM(CRM) and the BRIM FI systems.
  • SAP Modules include FI (all areas), CO, MM, SD and CRM.
  • Created PFCG roles for the Business Roles in CRM 7.0 IC WebClient UI.
  • Worked on reporting requirements for CRM, HR, FI and Telematics roll-outs.
  • Worked with workflow consultant to implemented effective security for SRM Worked with other team members on CRM / ACE security.
  • Propose effective CRM Secuirty design strategies by effectively leverging Org Models.

Show More

23. Siem

demand arrow
average Demand
Here's how Siem is used in Security Architect jobs:
  • Provided architectural review of implemented SIEM and system security plans.
  • Develop SIEM integration and escalation processes.
  • Core knowledge of IDS, data loss protection systems, SIEM's, network forensic analysis and incident management.
  • Implemented SIEM, firewall, and virtual infrastructure for internal network along with IT staff.
  • Selected as ArcSight Protect 2010 Session Speaker on best practices in SIEM architecture and deployment.
  • Reviewed SIEM, NGFW, and IPS solutions for implementation in managed security operation.
  • Develop custom SIEM and IPS Alerts and Rules to prioritize incidents and reduce noise.
  • Perform SIEM Monitoring and Auditing within the Oracle ERP.
  • Lead SIEM content creation and review.
  • Develop project deliverables for key SIEM monitoring and reporting compliance requirements.
  • Architected and Implemented LogRhythm SIEM (LogRhythm) for account compromise detection, currently collecting 250+ million logs per day.
  • Performed design, configuration & maintenance of SIEM Participated in deployment /configuration and maintenance of Network IPS.
  • Architected monitoring, IDS and SIEM infrastructure for customer cloud.
  • Review SIEM logs via Splunk.
  • Implement an auditing and compliance framework (SIEM solution) using Tivoli CARS running on a WAS/IHS 6.x cluster and Splunk.

Show More

58 Siem Jobs

No jobs at selected location

24. Active Directory

demand arrow
average Demand
Here's how Active Directory is used in Security Architect jobs:
  • Created PowerShell Security scripts for Active Directory.
  • Azure: Living on the Outside: Spearheaded the Proof of Concept based on O365 and Azure Active Directory.
  • Head of definitions, structure and effective participation on Microsoft Windows directory services (Active Directory) restructure.
  • Facilitated design and implementation of Server 2003 to Server 2008 R2 Active Directory migration.
  • Redesigned Active Directory to facilitate the integration of the Cesar's network infrastructure.
  • Upgraded Windows 2000 Active Directory Schema to support Windows 2003 Certificate of Authority.
  • Led a project to consolidate disparate Active Directory Domains into 3M Corporate Forest.
  • Implement SPNEGO based SSO with CIS Active Directory for internal users.
  • Implemented and integrated 6 Active Directory servers and 3 Exchange servers.
  • Support for two factor integration with CyberArk and Active Directory.
  • Design considerations included ADSSO, posture assessment, Active Directory login script accommodation and the Cisco NAC agent.
  • Contract through TEKSystems Audit Active Directory permissions, group policies, and design against best practices.

Show More

10 Active Directory Jobs

No jobs at selected location

25. Security Design

demand arrow
average Demand
Here's how Security Design is used in Security Architect jobs:
  • Designed roles by analyzing business processes and user needs and perform functional security design, configuration.
  • Obtain stakeholder buy-in for security designs.
  • Document BW-HR Security design document.
  • Provided guidance and strategy for international ERP security design for ECC, PI, and SAP MDM, and single sign-on
  • Completed a full cycle of implementation of new security design (Job roles approach) for more than 6500 users.
  • Determined security design of Missile Defense systems for integration with Navy for Missile and Weapons System.
  • Identified existing flaws in Security Design (BI & APO) and redesigned the security roles.
  • Experience with Role based security design (role creation, transports and organization levels).
  • Head of security design and implementation of new corporate and trading networks.
  • Helped design and refine the network and security design and implementation.
  • Coordinated the R/3 Security design and built for this implementation.
  • Created the Master Role Matrix based on the security design.
  • Architect/Created complete security design/roadmap for SAP, BW implementation base on discussion with different area lead/Dept.

Show More

76 Security Design Jobs

No jobs at selected location

26. Linux

demand arrow
average Demand
Here's how Linux is used in Security Architect jobs:
  • Developed and implemented security configuration standard for underlying Linux servers.
  • Implemented and maintained centralized Linux patching.
  • Installed and configured all RSA appliance Linux servers and RSA application to run in a lights out environment.
  • Experience with open source tools such as Kali Linux, Snort, and SANS Investigative Forensics Toolkit.
  • Configured and maintained server and network appliances supporting Windows, Linux, and Unix operating systems.
  • Standardized all Linux environments from 6 different distributions to Red Hat Enterprise Linux 4.
  • Involved in creating the Apache web and App agents on Linux servers.
  • Develop and test next generation firewall on FreeBSD Linux.
  • Performed vulnerability assessments and validation using Kali Linux and Burp Suite Professional.
  • Designed and developed security features for Ambient's Linux-based data collection systems.
  • Worked with Linux TPM libraries and hardware for trusted booting and cryptographic support.
  • Oversee software configuration and deployment in a 2000 node Redhat Linux environment.
  • Upgraded all webagents windows, Linux, Domino, and SharePoint agents.
  • Worked with NSA on SELinux base for router firewall.
  • Used Unix/Linux (TOP command) to view and investigate server performance Used Wireshark to sniff network.
  • Utilized Linux, Solaris, Python, Korn, and ArcSight 5.0, FushionIO NAND PCIE SSD

Show More

11 Linux Jobs

No jobs at selected location

27. Ldap

demand arrow
average Demand
Here's how Ldap is used in Security Architect jobs:
  • Evaluate and consult on SiteMinder/IIS/MIIS/IDM/Sun One LDAP configuration, high-availability, automation, and restoration.
  • Implemented MS Identity Integration Server (MIIS) to enable single-sign-on for users between Unix and Windows via LDAP server.
  • Design and configuration of HA LDAP servers: Configuration of highly replicated master/slave deployments of ODSEE directory servers.
  • Participated in application integration for example: LDAP, IDM, SAP UME, shared directories etc.
  • Implement auto recovery feature (my own design matrix) of LDAP rebuilds and restore.
  • Devised utilization of LDAP for user provisioning (Portal/ABAP) role assignment and user creation.
  • Installed IDASS provider LDAP agent to import users from LDAP on-premises directory to Cloud directory.
  • Directed their activities as the technical lead to upgrade the GM Corporate LDAP infrastructure.
  • Provide root cause analysis for Sun One LDAP application, WebSEAL and misc.
  • Assembled developer training materials on SQL & LDAP injection attacks and code review.
  • Light Directory Access Protocol (LDAP) 4.
  • Supported LDAP Infrastructure in creating user accounts.
  • Upgraded and redesigned current LDAP architecture.
  • Integrated Unix logins with AD before commercial products were available by using open source tools like LDAP.
  • Configured CUA based on LDAP (light weight directory accesses protocol) and SAP ALE functionality.
  • Created custom-built server and client RPMs of OpenLDAP, OpenSSL, NSS-LDAP and PAM-LDAP.
  • Installed and configured CAWily MonitoringTool to monitor the runtime activities for Siteminder and LDAP Infrastructure.
  • Designed VPN solution using Nortel Contivity, Entrust PKI X.500 & Netscape LDAP Directory).

Show More

28. BI

demand arrow
average Demand
Here's how BI is used in Security Architect jobs:
  • Establish and communicate a corporate vulnerability management process that builds upon the existing corporate process.
  • Assist in infrastructure vulnerability testing.
  • Performed IS audits for a myriad of large Fortune companies in accordance with COBIT standards.
  • Review Vulnerability Assessments for each system and create Risk Management Plan based upon residual risk.
  • Worked with the BI team to develop Hierarchies and establish control using Analysis authorizations.
  • Designed BOBJ 4.0 Security with BI roles driving the restrictions.
  • Developed the BI-BOBJ Security Upgrade Plan including the integration methods.
  • Provide leadership in the threat and vulnerability assessment process.
  • Configured BOBJ-BI Aliases for Single Sign-On.
  • Full P&L responsibility.
  • Created all roles for BI 7.3 - Tech Team and Reporting.
  • Sole author of HP CyberSecurity White Paper that explained auto-remediation possibilities and mitigations for vulnerabilities in a Continuous Monitoring environment.
  • Created a system wide vulnerability scanning program using Symantec Control Compliance Suite.
  • Assumed leadership role of 4 developers to establish a global infrastructure for a biometric/smart card security system.
  • Work with IBM Divisions to understand how to integrate QRadar capabilities into their offerings and existing Clients.
  • Developed request workflows in CUP for several systems, including ECC, BI and SRM.
  • Worked with Joint Interoperability Test Command (JITC), military and DISA.
  • Created audit controls to match NIST 800-53 and Cobit 5.
  • Tasked with designing an alternative to dependency on XEngine and Biztalk for claims processing.
  • Structured the Security Design for BI 7.0 including reporting tools BEx and Xcelsius.

Show More

8 BI Jobs

No jobs at selected location

29. HR

demand arrow
average Demand
Here's how HR is used in Security Architect jobs:
  • Developed and implemented Derived Role to accommodate client's specific requirement throughout the company global organization business models.
  • Evaluate, recommend and implement reasonable security controls and or procedures to mitigate identified threats.
  • Major focus on incident reduction and reduced tickets through proactive operations.
  • Managed a team of 10 Engineers designing, implementing and supporting cutting-edge solutions throughout the enterprise as well as for customers.
  • Demonstrate how to insert CAS within an application using Inversion of Control (IoC) through Spring Security framework.
  • Lead, investigate, document, and partner to resolve security issues through individual and team contributions.
  • Installed Cisco MARS IPS which helped identify and respond to security threats across the customer networks.
  • Prepared the impact analysis study for HR upgrade involving ESS, MSS and E - Recruit.
  • Chaired the meetings with Business, IT and HR teams to procure data for CUP configuration.
  • Provide Threat Assessment including conducting the source code analysis, automatic and manual security testing.
  • Performed cost analysis, threat analysis, and residual risk assessment for systems design.
  • Risk assessments were based on current threat landscape intelligence and impact to the organization.
  • Design physical security architecture to interconnect three clouds data centers with call center.
  • Design, Develop, Implementation and Maintenance of SAP HR Structural authorizations.
  • Developed security access for HR Structural (PD profile) Authorizations.
  • Lead engineering teams from Plan and Define through Deployment of projects.
  • Provided GLBA/FDIC and HIPAA compliance through security services.
  • Respond quickly to emerging threats.
  • Worked on sync and async verification principles in SAP HR, to safeguard critical actions in the system.
  • Manage SailPoint POC installation, integration, provisioning and connectors(AD, Peoplesoft HRMS(read), Peoplesoft finance-Read-write.

Show More

23 HR Jobs

No jobs at selected location

30. Cyber

demand arrow
low Demand
Here's how Cyber is used in Security Architect jobs:
  • Work on Vendors security patch management and own and maintain security related policy and procedure documents including cybersecurity maintenance plan.
  • Educated different departments' leadership on cyber security subjects and advised investment department on security industry.
  • Provided technical writing support to business development teams on cyber security proposal solutions.
  • Acted as the Cybersecurity liaison to aviation industry regulatory agencies.
  • Investigated and developed multiple security projects both cyber and physical.
  • Led cyber-investigations and operation-forensic reviews (2003-2005).
  • Promote, initiate, and mature tactical initiatives that align with the leadership team on Cybersecurity s Critical Security Controls.
  • Manage full cycle Cyber Security technology solutions and architecture including all applications, hardware, software, etc.
  • Conducted cyber security inspection duties auditing supply chains for nuclear power plants.
  • Managed and grew the cyber threat operation throughout 2003-2008.
  • Organized and Lead State wide Cyber Security exercises.
  • Create and post cyber mitigation and remediation expertise.
  • Increased cyber security budget significantly, based on risks and prioritizing the solution with Executive Security Committee.
  • Completed numerous certifications/training to support NSIR cyber security activities
  • Reviewed COTS software and development frameworks to track cyber security issues in the software supply chain that supports the organization.
  • Integrated multiple event auditing and reporting systems to monitor cyber threats to include malware, phishing and APT.
  • Implement NIST/ COBIT Cybersecurity Framework and Countermeasures to defend against advanced persistent threats (APTs).
  • Authored white paper on cyber intelligence for Board of Directors.
  • Identified current cyber security trends and socialized possible future breaches to the cyber security and IT team.
  • Completed "Advanced Cyber Security Inspection Training" at Idaho National Labs (INL).

Show More

116 Cyber Jobs

No jobs at selected location

31. Hipaa

demand arrow
low Demand
Here's how Hipaa is used in Security Architect jobs:
  • Provided HIPAA Compliance, Networking and Security consultation
  • Demonstrated experience in cloud technology security, FISMA, HIPAA, FFIED and/or Public Sector compliance.
  • Organized HIPAA transaction, privacy, and security committees and created/managed HIPAA project plan and documentation.
  • Conducted a review of the District's compliance posture on HIPAA for Human Resource personnel.
  • Developed and executed risk assessment policies to secure and bring the environment into HIPAA compliance.
  • Audit resulted in zero findings from the subsequent HIPAA audit.
  • Meet technical requirements necessary for HIPAA and ARRA/ HITECH, Gramm-Leech Bliley, PCI-DSS and Sarbanes-Oxley compliance.
  • Estimated that pre-audit reduced the cost of HIPAA compliance by $5M.
  • State of Colorado: Performed HIPAA pre-audit to identify potential security issues.

Show More

32. Security Standards

demand arrow
low Demand
Here's how Security Standards is used in Security Architect jobs:
  • Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses.
  • Completed additional training in Treasury specific security standards that helped provide soundness and validity to the TWAI security strategy.
  • Provided consultative subject matter expertise during projects with regards to information security standards and functionality.
  • Provided direction on the application architectural security standards for both NAFTA and Global security.
  • Developed, documented and communicated 40+ security standards and policies for global implementation.
  • Performed information security systems security standards compliance audits and reviews.
  • Authored security standards used across Asset Management line of business.
  • Maintained compliance with Federal Information Security Management Act (FISMA) developed through NIST based security standards and guidelines.
  • Contribute to build library of design patterns, security standards, check lists, and other guiding artifacts.
  • Develop, plan, conduct and document internal and external security standards/compliance assessments and scans.
  • Research, analyze and recommend IT security standards, policies, technologies and products.
  • Developed secure coding policies for the company to comply with J2EE security standards.
  • Develop and maintain information security standards, policies, and procedures.
  • Consulted with projects to ensure compliance to IT security standards.
  • Authored security standards for OS and database hardening.
  • Develop architecture reference material to ensure that security standards and best practices are implemented in a repeatable fashion.
  • Developed identity andaccess management system requirements, processes, and specifications based on organizational business requirements mapped to informationsecurity standards.

Show More

117 Security Standards Jobs

No jobs at selected location

33. PKI

demand arrow
low Demand
Here's how PKI is used in Security Architect jobs:
  • Drafted security policy and requirements for a PKI implementation.
  • Lead initiative to deploy second generation PKI infrastructure.
  • Implemented Public Key Infrastructure (PKI) using MS Certificate of Authority.
  • Author deliverable document Deployment Plan and Approach for PKI Secure Email.
  • Reviewed PKI Key Management plan against NIST SP 800-57 standard.
  • Authored a proposal for upgrade of existing PKI infrastructure.
  • NET SQL Injection ASP.NET JavaScript C# Cross-site Scripting PKI J2EE Web Inspect
  • Architected multi-site High Availability solution for FRIT certificate based (PKI) e-business environment.

Show More

31 PKI Jobs

No jobs at selected location

34. IDS

demand arrow
low Demand
Here's how IDS is used in Security Architect jobs:
  • Established an IDS alert analysis methodology to correlate other sources.
  • Established minimum operational activities for IDS monitoring.
  • Configured and managed firewall, VPN, SSL, PPTP, IDS, load balancing, router, and switching devices.
  • Implemented, troubleshooted, and maintained over 120 firewalls, IDS, network routers, probes, and management applications.
  • Manage a four-member security operations team - backed by 35 technicians - that support a 300+ node IDS/IPS.
  • Develop, review and manage all IDS/IPS systems, NAC Appliance settings, policies and rules.
  • Scheduled Jobs to produce the reports of FF ids and sent to Functional Managers.
  • Created test IDs for newly created roles for UAT and modified roles accordingly.
  • Established weekly and monthly metrics to measure IDS value.
  • Created Systems Ids and Roles within the FICA system.
  • Designed and implemented Next Gen IPS/IDS systems.
  • Deployed Network-based & Host-based IDS.
  • Designed and implemented HIDS for NOAA scada system using an open source tool OSSEC to bring system to full compliance.
  • Provide on-call after hours support for both client support as well as IDS monitoring.
  • Created Service market Place IDs, developer keys and updated login information of Hotline IDs for SAP in service marketplace.
  • Introduced IDS/IPS into Avaya network security architecture Lead security consultant for Fortune 50 companies.
  • Configured Cisco ASA , IDS/IPS and Palto Alto Firewalls.
  • Created and tested IDS VMs using opensource packages.

Show More

16 IDS Jobs

No jobs at selected location

35. Risk Analysis

demand arrow
low Demand
Here's how Risk Analysis is used in Security Architect jobs:
  • Conduct vulnerability assessments on information systems to determine security posture and provide risk analysis and risk management prioritization.
  • Provided flawless troubleshooting and risk analysis to critical MDA classified and unclassified assets.
  • Performed risk analysis and recommended appropriate security solutions as necessary.
  • Performed security risk analysis of existing PKI infrastructure.
  • Managed the program risk registered; performed risk analysis and recorded recommendations of the Risk Management Working Group.
  • Assisted and trained the functional teams in performing risk analysis using SAP GRC, remediation and mitigation processes.
  • Apply expertise in risk analysis techniques to legacy technologies as well as merging and disruptive technologies.
  • Performed Risk Analysis of network access systems.
  • Implemented trusted devise functionality and risk Analysis using Riskminder.
  • Integrated IDM with GRC 10.0 for Risk Analysis and de-centralized distribution using standard IDM adapters.

Show More

36. Audit Procedures

demand arrow
low Demand

37. VPN

demand arrow
low Demand
Here's how VPN is used in Security Architect jobs:
  • Coordinated and built, policies, rules, and implemented site-to-site VPN's with external partner businesses, and new acquisitions.
  • Manage Multiple(10+) Check Point Firewalls with multiple policies, including FW/IPS/NAT/Mobile Access/VPN.
  • Designed and implemented performance improvements for an enterprise VPN and secure remote access product.
  • Reviewed and troubleshot Cisco ASA VPN, dynamic access policy and access rule configurations
  • Deployed a Check Point VPN for over 500 users for a subsidiary.
  • Designed and implemented secure remote access for 5000+ Ceridian employees using Cisco VPN technology and Secure Computing hardware tokens.
  • Performed daily Cisco 3000 VPN concentrator administration for site to site connectivity, and remote VPN access.
  • Implemented authentication using X.509 digital certificates for establishing IPSec connection with the Cisco VPN service.
  • Deployed new VPN technologies and phased out all of the older ones as well.
  • Configured and maintained Cisco VPN router to support customer VPNs to data center.
  • Implemented and maintained Cisco VPN concentrator for remote access to disaster recovery site.
  • Enrolled IPSec (Offline) certificates on Cisco 3080 VPN concentrators using SCEP.

Show More

7 VPN Jobs

No jobs at selected location

38. Risk Assessments

demand arrow
low Demand
Here's how Risk Assessments is used in Security Architect jobs:
  • Perform security risk assessments of over 60 Enterprise systems resulting in a reduction in audit findings.
  • Conducted risk assessments, and ensured all compliance controls were in line with NERC CIP regulations.
  • Perform risk assessments, identify solutions, complete proof of concepts and provide position statements.
  • Performed reviews, evaluations, and risk assessments of new technologies and services.
  • Headed the creation and implementation of security process and procedures for risk assessments.
  • Evaluate security architecture against industry best practices and standards by performing risk assessments.
  • Developed cyber security plans for their smart grid projects and performed smart grid cyber security risk assessments using NIST standards.

Show More

10 Risk Assessments Jobs

No jobs at selected location

39. System Security

demand arrow
low Demand
Here's how System Security is used in Security Architect jobs:
  • Conducted system security and vulnerability analyses, performed risk assessments and prepared cost estimates.
  • Perform HR personnel investigation and system security investigations as requested.
  • Team Lead on remediation of Sun, HP and IBM UNIX servers for System Security Enhancements.
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends.
  • Prepared System Security Plans (SSP) in accordance with the NISPOM and JAFAN.
  • Managed compliance as Company Information System Security Officer (ISSO).
  • Worked in setting up the SAP Convergent Charging system Security with.
  • Major roles/contributions include: Lead design, Implementation, management of Enterprise System Security infrastructure, for State Street.

Show More

41 System Security Jobs

No jobs at selected location

40. Security Posture

demand arrow
low Demand
Here's how Security Posture is used in Security Architect jobs:
  • Performed gap analysis along with technical assessments to establish additional controls to reduce risk and improve security posture.
  • Evaluated security implications of new technologies to ensure a minimal impact to the organization's security posture.
  • Review of overall security posture in support of accreditation.
  • Use this position to communicate directly with the customer on their issues and how Cisco products can improve their security posture.
  • Coordinated with internal groups, clients, and vendors to respond to customer questionnaires regarding security posture within the company.
  • Drive the decision process to be mutually beneficial (win/win) while maintaining a consistent Information Security posture.
  • Worked with process owners and executives during the merger with Global Payments to ensure continuous security posture.
  • Directed firm's strategic direction toward an overall security posture, product development, and compliance.
  • Design, implement and maintain overall security posture to the organization.
  • Developed and implemented plan for improving CWIN s security posture.
  • Performed penetration testing and Vulnerability Assessments on periodic basis to ensure security posture for company as well as compliancy.
  • Responded to customer questionnaires regarding security posture within Ceridian.
  • Assessed and improved security posture of a 3000 host PCI Level I environment.
  • Created and deployed vulnerability management scripts and SCAP content to inv entory and assess system compliance and security posture.

Show More

59 Security Posture Jobs

No jobs at selected location

41. Business Units

demand arrow
low Demand
Here's how Business Units is used in Security Architect jobs:
  • Developed and responsible for performing and managing PCI-DSS related data security standard engagements across a variety of Bloom Energy business units.
  • Customized security awareness training to management, development and quality assurance teams from multiple business units.
  • Coordinate with other business units and third-party providers to ensure that solutions meet security requirements.
  • Established Information Security Committee with representatives from all business units.
  • Provide project level security consultation to various business units.
  • Promote security awareness among business units.
  • Closed out various Accenture business units to zero vulnerabilities, was first to make this significant impact Accenture wide.
  • Partner with business units to ensure with compliance with diverse security requirements(NIST, BISP, SAFR).
  • Supported the Alaska Airlines business units to ensure third party applications comply with our security policies and principles.
  • Developed disaster recovery strategy and plan for the District of Columbia Courts in cooperation with various business units.
  • Reviewed the scanning across the existing zones and Business Units and will make recommendations for improvement.
  • Worked with various business units to establish a vendor manager training process for security and compliance.
  • Created Access database and corresponding Sql queries to map users to existing roles and enable reporting of roles to business units.

Show More

42. IDM

demand arrow
low Demand
Here's how IDM is used in Security Architect jobs:
  • Assist with consulting and recommendation for new Federated IdManagement project.
  • Support IAM and IDM applications on AIX and Red Hat; such as SiteMinder, ControlMinder, and Puppet.
  • Integrated SAP GRC with Sun IDM, cutting down provisioning time, enabling real-time SOD check.
  • Worked with Basis to maintain attribute mappings between SAP HCM and IDM.
  • Helped organization prepare for a global implementation of IDM.
  • Worked on user rename mini project for IDM.
  • Worked through the design phase of SAP IDM.
  • Configured Password Self Service in IDM Configured IDM entry types, Task Templates and Job Templates for SAP provisioning.
  • Design and assist with IdManagement review with Tivoli Identity Manager 4.5.

Show More

43. Fisma

demand arrow
low Demand
Here's how Fisma is used in Security Architect jobs:
  • Supported the IRS Enterprise Security Audit Trails customer, utilizing ArcSight to process the IRS Production Enterprise FISMA Audit Log Data.
  • Provide Technical consulting for Architecture, implementation guidance, compliance, and process definition under FISMA compliance and NIST guidelines.
  • Reviewed and wrote policies and procedures in accordance with FISMA and NIST standards.
  • Led FISMA audits and lead the transition to NIST-RMF standards from DIACAP.
  • Experience with PCI-DSS, FedRamp, FISMA, HIPPA, and various compliances.

Show More

61 Fisma Jobs

No jobs at selected location

44. SCM

demand arrow
low Demand
Here's how SCM is used in Security Architect jobs:
  • Converted all custom reporting authorization objects in BW3.1 to analysis authorization, also designed and implemented analysis authorization BI in SCM.
  • Directed European affiliate offices in SAP Security Authorization Concept and SCM Security global design.
  • Reviewed requirements updated in solution manager to build roles for BI, FI, SCM and SCS.
  • Provided SME guidance for SCM Security team.
  • Created Reporting authorizations in SCM system.
  • Developed post Go Live Security processes for SAP ECC, BI, BOBJ, GTS, SCM.
  • Worked on risk mitigation for BI, FI, SCM and SCS.

Show More

45. SRM

demand arrow
low Demand
Here's how SRM is used in Security Architect jobs:
  • Helped Wal-Mart suppliers to perform maintenance services transaction and purchase order collaboration using SRM supplier portal.
  • Defined processes for SAP SRM integration with Retail Link.
  • Helped Wal-Mart (Real FM/SRM project), integrate Plant Maintenance and SRM functionalities.

Show More

46. SQL

demand arrow
low Demand
Here's how SQL is used in Security Architect jobs:
  • Designed complex SQL configurations to support role-based authorizations.
  • Study of Cross-Site Scripting vulnerabilities, SQL injection and their detection in the PHP / Java source code.
  • Developed and standardized SQL 2000 Enterprise server cluster solution with EMC SAN across.
  • Configured DB2 User directories and SQL schemes for user authentications.
  • Designed backend environment encompassing SQL, SSRS, SSAS and IIS.
  • Used Xampp (containing Apache, MySQL, PHP and Perl.)

Show More

10 SQL Jobs

No jobs at selected location

47. DLP

demand arrow
low Demand
Here's how DLP is used in Security Architect jobs:
  • Gather and analyze customer business and technical specifications on new and existing DLP implementations.
  • Devised and deployed solutions utilizing Open Source Software to meet various challenges including password management, DLP, and Log Monitoring.
  • Provided security architecture support for a global Data Loss Prevention (DLP) implementation project.
  • Facilitated Symantec DLP deployment, and troubleshooting.
  • Implemented SSL filtering on Websense (web traffic proxy) as a first step towards a full DLP solution.
  • Provided ArcSight and engineering support for the IRS/Symantec's Data Loss Prevention (DLP) project.
  • Monitored Fidelis DLP system and created policies.

Show More

48. Intrusion Detection

demand arrow
low Demand
Here's how Intrusion Detection is used in Security Architect jobs:
  • Managed over 40 Enterprise Cisco 4235 Intrusion Detection appliances at eight sites.
  • Installed and configured firewall, VPN, and intrusion detection products.
  • KEY ACHIEVEMENTS: Spearheaded the development of new strategies and design for network intrusion detection and prevention.
  • Piloted Symantec Intruder Alert for host based intrusion detection.
  • Architected multi-layer Network Intrusion Detection/Prevention solution for customer facing ecommerce site.

Show More

33 Intrusion Detection Jobs

No jobs at selected location

49. RSA

demand arrow
low Demand
Here's how RSA is used in Security Architect jobs:
  • Researched and led the implementation and administration of information security controls and oversaw a corporate merger security integration effort.
  • Developed and oversaw implementation of security controls to meet client's tactical and strategic requirements.
  • Involved in RSA NIC SFTP agent installation, configuration to ship logs from hosts to RSA envision product for Log aggregation.
  • Ensured the identification of new security technology solutions; oversaw the design and reviewed the deployment of new solutions.
  • Evaluated alternative solutions to RSA SecurID, including other token providers and the use of Digital Certificates.
  • Co-defined business requirement for vulnerability management tools (RSA Archer) & SEIM (ArcSight).
  • Deployed RSA Key Management System.
  • Eliminated SOD conflicts using SAP's GRC Tool Virsa.
  • Implement java package handlers to maintain workflow processes of the RSA/Aveksa application.

Show More

50. Sdlc

demand arrow
low Demand
Here's how Sdlc is used in Security Architect jobs:
  • Integrated software security code reviews, static and dynamic scanning into Agile SDLC.
  • Published Software Development LifeCycle (SDLC) that included phase gate acceptance process.
  • Worked with Blue and Red team to determine risks and assisted development team in secure SDLC.
  • Cloud, Single sign on, SDLC).

Show More

Security Architect Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Security Architect

Architecture

14.1%

Ensure Compliance

12.7%

Infrastructure

9.1%

Information Security

7.9%

Security Policies

6.1%

Cloud

4.6%

Business Requirements

4.2%

GRC

4.0%

PCI

3.7%

Security Solutions

3.6%

Access Management

3.2%

ECC

3.1%

SOX

3.1%

Governance

3.0%

Access Control

3.0%

Security Requirements

3.0%

Nist

2.9%

Application Security

2.9%

Incident Response

2.9%

SSO

2.8%
Show More

Typical Skill-Sets Required For A Security Architect

Rank Skill
1 Architecture 8.8%
2 Ensure Compliance 7.9%
3 Infrastructure 5.7%
4 Information Security 5.0%
5 Security Policies 3.8%
6 Cloud 2.9%
7 Business Requirements 2.6%
8 GRC 2.5%
9 PCI 2.3%
10 Security Solutions 2.3%
11 Access Management 2.0%
12 ECC 2.0%
13 SOX 1.9%
14 Governance 1.9%
15 Access Control 1.9%
16 Security Requirements 1.9%
17 Nist 1.8%
18 Application Security 1.8%
19 Incident Response 1.8%
20 SSO 1.8%
21 ISO 1.8%
22 CRM 1.7%
23 Siem 1.7%
24 Active Directory 1.6%
25 Security Design 1.6%
26 Linux 1.5%
27 Ldap 1.4%
28 BI 1.4%
29 HR 1.4%
30 Cyber 1.4%
31 Hipaa 1.4%
32 Security Standards 1.4%
33 PKI 1.3%
34 IDS 1.3%
35 Risk Analysis 1.3%
36 Audit Procedures 1.3%
37 VPN 1.2%
38 Risk Assessments 1.2%
39 System Security 1.2%
40 Security Posture 1.1%
41 Business Units 1.0%
42 IDM 1.0%
43 Fisma 0.9%
44 SCM 0.9%
45 SRM 0.9%
46 SQL 0.9%
47 DLP 0.9%
48 Intrusion Detection 0.9%
49 RSA 0.9%
50 Sdlc 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

16,829 Security Architect Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.