FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Security Architect

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Security Architect Skills

Below we've compiled a list of the most important skills for a Senior Security Architect. We ranked the top skills based on the percentage of Senior Security Architect resumes they appeared on. For example, 8.6% of Senior Security Architect resumes contained Architecture as a skill. Let's find out what skills a Senior Security Architect actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Security Architect:

1. Architecture

demand arrow
high Demand
Here's how Architecture is used in Senior Security Architect jobs:
  • Managed an array of security related projects including network share security re-architecture, and privileged account cleanup.
  • Designed and implemented an HA architecture to segregate primary revenue systems into a separate and redundant network.
  • Developed use case scenarios and integration architecture in utilizing Intrinsic-ID technology with customer's products.
  • Review application and hardware architecture and make recommendations to improve the enterprise security posture.
  • Help develop consistent security patterns and frameworks to evolve the company's security architecture.
  • Improved architectural design and review process to include security reviews and architecture.
  • Designed architecture for disaster recovery hot site.
  • Started upgrades to aging security architecture.
  • Initial designer of SAP Security architecture.
  • Design, apply, and manage the overall security content and complex cross-discipline architectures or strategies which integrate with industry trends.
  • Incorporate security best practices in the network architecture and design by providing security consulting services to business units and project teams.
  • Led multiple teams in areas of technical and security architecture, design, consulting and implementation.
  • Involved in design, architecture, testing, implementation and support of these various security technologies.
  • Defined, developed, and communicated security and system architecture for a large IC/DoD Agency.
  • Worked with client to review and redesign their architecture to improve their overall security posture.
  • Led architecture development, implementation, testing, documentation, training and client turnover.
  • Learned about many tools, architectures, and practices related to security technologies.
  • Led cross group team to develop Trusted Computing Architecture for laptop PCs.
  • Exploit physical and network vulnerabilities of commercial clients * Develop and deploy enterprise security architecture (CWAN/GWAN).
  • Used the MS Visio to create entire system architecture for staging and production environments.

Show More

45 Architecture Jobs

No jobs at selected location

2. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Security Architect jobs:
  • Manage the Penetration Testing completed by 3rd Party provider to ensure compliance with PCI DSS.

Show More

3. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Senior Security Architect jobs:
  • Developed standardized packages for internal security assessments, external security assessments, network penetrations and network infrastructure assessments.
  • Evaluate threats to infrastructure based on technology evolution curve, anticipated business models and competitive landscape changes.
  • Produced high level documentation regarding security infrastructure design and functionality for both internal and external accesses.
  • Analyze and recommend strategy and direction to mitigate security risks within IT architecture and infrastructure.
  • Assigned to Global Technology Services in the infrastructure and physical security division.
  • Managed outsourced services and decreased risks to corporate and customer infrastructure.
  • Designed Windows auditing and alerting strategy and event log correlation infrastructure.
  • Author architecture documentation on customer infrastructure for future reference.
  • Involved in system/infrastructure architecture of Staging and production.
  • Authored architecture documentation on customer infrastructure.
  • Hired to provide solutions, design and architecture for all PayPal and eBay applications and network infrastructures.
  • Designed and installed a global ACE (RSA Secure ID) infrastructure.
  • Lead a team with two developers and one infrastructure engineer.
  • Tested and validated IT Infrastructure IAVA Compliance as a team.
  • Designed and implemented public key infrastructure (PKI).
  • Led a large network re-architecture project to upgrade core infrastructure components and provide improved performance and scalability for mission-critical applications.
  • Researched emerging threats, trends, and vulnerabilities to determine potential impact to technology infrastructure.
  • Use Visio to draw sequence diagrams for software developers and to draw deployment diagram for infrastructure engineer.
  • Support current infrastructure and assist in code review and promotion to higher environment.
  • Designed and developed enterprise-wide information security systems and architecture across Company's networking infrastructure including related communications hardware and software.

Show More

19 Infrastructure Jobs

No jobs at selected location

4. Firewall

demand arrow
high Demand
Here's how Firewall is used in Senior Security Architect jobs:
  • Developed and tested disaster recovery for critical IT devices including systems, firewall and application servers.
  • Tied all firewalls into OSPF to provide fault tolerance for users and distribute external routes into local network.
  • Implemented a lab environment to test out vendor firewalls, anti-virus, scanners, and patch upgrades.
  • Developed secure transport across multiple firewalls and proxy servers using SSH with RSA.
  • Design, deploy, and maintain large-scale enterprise level firewall environment.
  • Design, configure and deploy firewalls for secure network environments.
  • Complete rename of all firewall objects and rules.
  • Maintained Juniper SRX family of firewalls Provided engineering requirements for budgetary year 2014.
  • Implemented next generation firewalls such as PaloAlto and Fortinet.
  • Deploy Palo Alto Next Generation firewalls globally.
  • Design Security Stacks based on the transactions identified which may require viewing traffic flows to alter and confirm application firewall rules.
  • Deployed an enterprise web application firewall solution (F5 ASM) at all global datacenters.
  • Architected with multiple firewalled segments, intrusion detection, and redundancy at all layers.
  • Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Show More

10 Firewall Jobs

No jobs at selected location

5. Information Security

demand arrow
high Demand
Here's how Information Security is used in Senior Security Architect jobs:
  • Manage system information security architecture, design, installation, operational planning, and risk remediation activities on a global basis.
  • Engineered, designed, and implemented information security controls to ensure the confidentiality, integrity, and availability of corporate data.
  • Integrated information security to facilitate business operations and reduced risk to enable technology to enhance business capabilities and create value.
  • Provided consulting and direction regarding information security administrative and technical solutions to a variety of internal business groups.
  • Boosted internal awareness of information security by providing training and writing blog content.
  • Performed information security risk analysis of business line activities, systems and processes.
  • Researched information security threats and developed defenses.
  • Qualified as a Holistic Information Security Practitioner (HISP), the ISO/IEC 27000 series based security certification.
  • Provided information security strategies to the CSO for an NY/NJ government organization on post 911.
  • Created the enterprise-wide information security architectures, policies, standards, and procedures.
  • Assist with designing and creating the information security management system (ISMS).
  • Provided security direction and guidance from all information security aspects to the corporation's business units.
  • Assessed, developed, and implemented information security programs including organizational design and key process/procedures.
  • Provided supporting documentation and expert advice in information security processes and procedures.
  • Developed and designed responses to regulatory changes affecting information security.
  • Managed large aquisition projects from an information security perspective.
  • Oversee the information security of business development with the Experian global support teams.
  • Develop information security roadmaps, business cases and remediation plans for the clients.

Show More

18 Information Security Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Senior Security Architect jobs:
  • Directed uses privilege level access to the application, leveraging already existing company security policies for application operations e.g.
  • Developed corporate policies and standards - developed and maintained corporate as well as departmental security policies.
  • Develop and implement automated solutions to improve compliance with security policies and standards.
  • Authored and/or sponsored numerous IT Security policies around server builds and implementation.
  • Developed and assisted in implementation of Information Security Policies and Procedures.
  • Created and implemented security policies.
  • Create, modify, and/or review proposed Information Security policies, standards and guidelines for approval by the relevant leaders.
  • Lead cross-functional teams to develop acceptable Enterprise security policies, standards & specifications for GE.
  • Possess experience with federal Information security policies, directives, guidelines and practices.
  • Updated TIAA-CREF's information security policies of using ISO17799 as the standard.
  • Assist in the creation, management and enforcement of IT Security Policies.
  • Implement and comply with the Security policies and procedures within HCSC.
  • Authored corporate technical security policies, directives, and white papers.
  • Work with legal to develop and implement security policies.

Show More

7 Security Policies Jobs

No jobs at selected location

7. Security Audits

demand arrow
high Demand
Here's how Security Audits is used in Senior Security Architect jobs:
  • Worked closely with internal and external audit teams during Security audits.
  • Defined best practices for security audits, DR plans and security enhancements.
  • Enhance security audits and process by presenting and implementing a three year security roadmap.

Show More

8. Cloud

demand arrow
high Demand
Here's how Cloud is used in Senior Security Architect jobs:
  • Collaborated with Product Managers for future, cloud ready design modifications.
  • Assessed cloud providers and products to meet NIST 800-53 for accreditation of applications operating in the cloud.
  • Assisted with the transition from boxed software to cloud based application and platform as a service.
  • Supported Cloud security - ensured that enterprise security needs were met for all cloud versions.
  • Lead the security risk evaluation of moving the Global Consumer Group applications into the Cloud.
  • Evaluated security technologies and networks (cloud and premise) to meet customer requirements.
  • Cloud - Collaborated on creating the first terms and requirements of cloud adoption/migration.
  • Lead Security Architect of CSC's global Cloud initiatives.
  • Designed and developed a prototype for the CTP, to generate evidence-based confidence from cloud service providers.
  • Architected the one of the first FEDRAMP certified MDM/Cloud/IPAD application for SBA (DCMS).
  • Identify non-PCI compliant assets at 28 data center locations for Amazon EC2, Cloudera, and Comcast Big Data Steel-Cloud.
  • Provided training and installation of Protegrity to encrypt/decrypt PII in the "Cloud"

Show More

38 Cloud Jobs

No jobs at selected location

9. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Senior Security Architect jobs:
  • Provided consulting services for security policy assessments, and risk assessments.
  • Provided security threat analysis and vulnerability/risk assessments in enterprise environments.
  • Performed gap analysis, conducted risk assessments, managed issues, designed and documented procedures.
  • Prepared the System Interconnect Agreements and System Security Plan and conducted Risk Assessments.
  • Conducted Risk Assessments of major Software Development efforts.

Show More

10. SOX

demand arrow
high Demand
Here's how SOX is used in Senior Security Architect jobs:
  • Interacted with SOX Auditors and responsible for Risk identification and Mitigation.
  • Interacted and communicated with the client and external SOX Consultant / Analyst and Engineer Seniors throughout the engagement at all levels.
  • Subject matter expert and participant within ISO/IEC17799, COBIT, Sarbanes-Oxley (SOX), GLBA, VISA CISP compliance initiatives.
  • Provided regulatory support - was the security representative for the SOX, EU Safe Harbor, and Mass.
  • Review critical and sensitive authorizations along with the audit team and implement roles that adhere to SoX.
  • Participated in production support for issues that needs specialized security expertise and helped in SOX cleanups.
  • Followed COBIT in 404 to become SOX compliant from and IT perspective.
  • Proposed and applied reviews and controls for Sarbannes-Oxley 404 (SOX).
  • Used standard project management tools and techniques throughout the SOX engagement.
  • Worked with team leads to ensure SOX compliance.
  • Redesigned the roles in a very short period of time so that the client can meet a SOX deadline.
  • Implemented logging, Nessus, wrote policies and developed encryption from framework for PCI/SOX compliance.

Show More

11. Pci-Dss

demand arrow
high Demand

12. Security Requirements

demand arrow
high Demand
Here's how Security Requirements is used in Senior Security Architect jobs:
  • Communicate with business about security requirements and third party reviews.
  • Analyzed Business and Functional requirements for SAP Security requirements.
  • Documented and delivered CIAM leading practice guidance to help drive core security requirements of new program.

Show More

24 Security Requirements Jobs

No jobs at selected location

13. Recovery Procedures

demand arrow
high Demand

14. Security Solutions

demand arrow
high Demand
Here's how Security Solutions is used in Senior Security Architect jobs:
  • Provided architectural and technical leadership with implementation of information security solutions and program for Fortune 500 clients.
  • Created and/or modified internal and customer presentations for a variety of security solutions.
  • Recommended and implemented Next Generation Information Security solutions for customers.
  • Designed and implemented Internet gateway security solutions.
  • Developed proof-of-concepts for various security solutions.
  • Provide advisory and subject matter expertise to design, build and implement Infrastructure Security Solutions for the firm's clients.
  • Managed the criteria and selection of clients to choose security products and vendors that lead to successful security solutions.
  • Deploy prototype or proof of concept for complex security solutions.
  • Lead the design and Implementation of the security solutions.
  • Architected Security Solutions - participated in the Enterprise Architecture team as the security representative.
  • Developed emerging security solutions and rollouts by defining analytics monitoring, Asset/Exposure management, Cybertrust MSS and incident/E-discovery services.
  • Designed and Implementation of advanced idM Security Solutions for IBM Customers World Wide.

Show More

21 Security Solutions Jobs

No jobs at selected location

15. Nist

demand arrow
average Demand
Here's how Nist is used in Senior Security Architect jobs:
  • Design and implementation of user administration solutions for new applications and transition of process to appropriate administration teams.
  • Enabled application architects to use compute resources more efficiently, lower administration overhead and reduce licensing costs.
  • Administered security policy and standards.
  • Develop enterprise security policy, standards, controls and guidelines based on PCI, SOX, HIPPA, and NIST standards.
  • Worked closely with system administrator teams to negotiate and determine whether the computer and network systems are in compliance.
  • Set up and Administration of Central User Administration (Addition of new systems, Troubleshooting etc.)
  • Corresponded with US-CERT to report security incidents and conducted GAP analysis for NIST 800 compliance.
  • Provided guidance on the improvement of operational processes for the SOC and Security Administration teams.
  • Achieved full compliance for industry specification standards (UL, NEMA, NIST).
  • Provided knowledge transfer and mentored peer consultants in HBSS capabilities & administration.
  • Administered the Software Development Life Cycle using Team Foundation Server 2008.
  • Configured and managed Central User Administration (CUA) environment.
  • Reviewed NIST SP 800-53 security plans.
  • Administer Users using SCUA, SCUL, SCUG and SCUM.
  • Prepared and administered budget Reviewed and updated policies and procedures
  • Experience: Worked as ArcSight ESM Administrator monitoring events and incidents for the Health and Human Services Security Operations Center.
  • Worked on firewall remediation and compliance plan Firewall and network troubleshooting Agency: SAIC Afghanistan/25th Signal Group
  • Worked with SUN Administration (Sol.
  • Created agents, Agent Conf and Host Conf Objects and User Directories using FSS Administrative UI.
  • Supported and administered Solaris 8, 9 and 10 servers and Windows [ ] Servers.

Show More

10 Nist Jobs

No jobs at selected location

16. Governance

demand arrow
average Demand
Here's how Governance is used in Senior Security Architect jobs:
  • Assigned by Sr. Management to develop a comprehensive vulnerability response governance structure to meet risk, audit, and regulatory requirements.
  • Perform Security policy governance and vulnerability management tracking and reporting with the GRC tool.
  • Provide governance and direction for proper use of data.
  • Aligned activities with Corporate IT Risk Policy Governance.

Show More

3 Governance Jobs

No jobs at selected location

17. Hipaa

demand arrow
average Demand
Here's how Hipaa is used in Senior Security Architect jobs:
  • Performed HIPAA HITECH security risk attestation on benefits management system.
  • Worked with HIPAA compliance teams to assist companies with the proposed technical HIPAA standards.
  • Perform gap analysis related to compliance (PCI, HIPAA, etc.)
  • Protected Health Information (PHI) subject to HIPAA regulations.
  • Worked with clients like MulitiPlan to become Hipaa Compliant using products like AppGate and password management software P-Synch.
  • Authored the Teradata HIPAA architecture, prolicies and procedures for the Teradata "Cloud" offerings.

Show More

18. VPN

demand arrow
average Demand
Here's how VPN is used in Senior Security Architect jobs:
  • Consolidated disparate remote access systems with a two-factor authenticated SSL VPN.
  • Designed and set up a vendor VPN for faster vendor access to the network while maintaining security and reducing cost.
  • Worked with external vendors that need to gain access to our internal network via VPN.
  • Performed periodic disaster recovery testing of Firewall, VPN, Network, OS systems.
  • Top troubleshooter able to quickly resolve complex firewall/VPN and other network security issues.
  • Planned, Upgraded, Migrated Network, VPN and data encryption and OS backend and front-end technology.
  • Managed VPN architecture and rollout of global VPN solution.
  • Implemented remote office VPN connections around the world Implemented Netsaint to monitor security equipment.

Show More

3 VPN Jobs

No jobs at selected location

19. Cyber

demand arrow
average Demand
Here's how Cyber is used in Senior Security Architect jobs:
  • Guided the client in the development of a Cyber-Security Operations capability.
  • Design and develop Cyber Security Operations capabilities for enterprise organizations desiring to detect and respond to global threats in real time.
  • Provided cyber security architecture support to 20 mission programs, directly resulting in their positive compliance assessment.
  • Performed cyber security compliance and vulnerability assessments of over 250 different Army Intelligence Systems.
  • Delivered four complex cyber security architectural solutions for Fortune 500 customers in 2013.
  • Develop and promote company and customer cyber security practice and business plan.
  • Assisted with cyber corporate strategy, and building operations and industry leadership/relationships.
  • Conduct performance reviews and evaluations of cyber security personnel.
  • Co-led a cross-regional team of 11 individuals to streamline, standardize and improve reporting for the Cyber Security division.
  • Developed Dell SecureWorks Cyber Security Operations Advancement Framework designed to advanced client Cyber Security Operations capabilities.

Show More

35 Cyber Jobs

No jobs at selected location

20. SME

demand arrow
average Demand
Here's how SME is used in Senior Security Architect jobs:
  • Served as a SME for Information Security with a background in computer forensic practices/methodologies and extensive knowledge of penetration testing tools.
  • Managed Information Security Risks through coordinating internal Security Risk Assessments and the creation of the Corporate Information Security risk acceptance process.
  • Established a program for network and systems vulnerability assessment that covered critical business environments in the U.S.
  • Coordinated and performed security assessments against program assets to ensure baseline security compliance.
  • Participate in ongoing projects including security vulnerability assessments and metric reporting.
  • Maintain technical proficiency as well as security audit and assessment methodologies.
  • Performed third party information security assessments, including vulnerability assessments.
  • Coordinated and validate vulnerability assessment to identify potential risk.
  • Performed internal assessments of various business unit security.
  • Performed full-scope security assessment of client infrastructure.
  • Provide Disaster Recovery training and plan development for federal agencies inclusive of RTO/RPO, Business Impact Assessment, and Risk Management.
  • Performed a Gap Analysis after a network security tool assessment revealed the lack of a formal strategy for tools usage.
  • Provided architectural assessments for Fortune 500 gaming, commercial, wealth management, travel and agricultural clients.
  • Created a vendor risk assessment questionnaire, which covers the vendor's process and procedures.
  • Advanced security assessments networks, devices, systems, applications, and cryptography controls.
  • Conducted internal risk assessment and recommended solutions in order to make them HIPAA compliant.
  • Sourced, tested, and purchased best of breed vulnerability assessment tools.
  • Manage information security and technology risk policies/standards/procedures, information security risk assessments, risk and compliance assessments for all Teradata systems.
  • Consulted with project teams to provide secure architecture for large projects using various assessment tools along with security best practices.
  • Author whitepapers, project plans, project justifications, KPI s, assessments and project prioritization endeavors.

Show More

21. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Senior Security Architect jobs:
  • Provided incident response and threat management for large commercial and government customers.
  • Develop incident handing and incident response playbooks for various clients.
  • Improved incident response processes procedures, and capabilities.
  • Implemented formal incident response plan.
  • Reviewed and analyzed Firewall logs and triaged Incident Response if necessary.
  • Design and develop Information Security processes (e.g., vulnerability mgmt., incident response, event monitoring, etc.)

Show More

3 Incident Response Jobs

No jobs at selected location

22. Access Management

demand arrow
average Demand
Here's how Access Management is used in Senior Security Architect jobs:
  • Mentored junior engineers in the identity and access management as well as programming logic, design and problem solving.
  • Created the Identity and Access Management environment for all the SPs.

Show More

18 Access Management Jobs

No jobs at selected location

23. Business Requirements

demand arrow
average Demand
Here's how Business Requirements is used in Senior Security Architect jobs:
  • Deliver quality secure solutions that meet business requirements and objectives.
  • Create Custom Authorization Objects to meet the business requirements.
  • Conducted workshop with the Business and Functional Leads Gathered Business Requirements from multiple Business Units.

Show More

24. Application Security

demand arrow
average Demand
Here's how Application Security is used in Senior Security Architect jobs:
  • Collaborated with management in developing technical directions, setting objectives, and setting realistic and challenging goals for Application Security Reviews.
  • Worked closely with network and operations security staff to ensure application security is integrated into the overall information security effort.
  • Hosted ASC Forum for application security champions - An internal designation promoting security excellence.
  • Developed Application Security Culture that resulted in mitigation controls for OWASP top 10vulnerabilities.
  • Implemented and maintained Application Security parameters.
  • Participated in application security architecture and design engagements to ensure our products were built with security in mind from the start.
  • Web Application Firewall SME and application security expert to address any and all concerns associated with Web services.
  • Streamlined the application security review process and completed 70+ reviews per year.
  • Extracted the application security controls from NIST-800.
  • Implement OWASP-10 for web application security.
  • Developed internal 'Web Application Security Roadmap' to manage expectations within the enterprise
  • Installed large-scale implementations of network, system and application security tools (e.g.

Show More

38 Application Security Jobs

No jobs at selected location

25. IDS

demand arrow
average Demand
Here's how IDS is used in Senior Security Architect jobs:
  • Designated as lead engineer for design and implementation of revenue-generating managed security and monitoring system for customer firewall and IDS systems.
  • Developed POC with Managed Security Service provider to support the IDS/IPS program and presented business case to executive leadership.
  • Installed and configured Site Protector, ISS Real Secure products for IDS.
  • Directed the software engineering effort for the Dragon IDS/IPS network sensor.
  • Implemented IDS/IPS to protect Corporate Internal and External IT perimeter.
  • Deploy network, host, and server based IDS.
  • Develop network/security architectures to ensure proper implementation of Firewalls, IDS, Malware protection, and secure system configurations.

Show More

1 IDS Jobs

No jobs at selected location

26. Ips

demand arrow
average Demand
Here's how Ips is used in Senior Security Architect jobs:
  • Presented hundreds of demos, created numerous presentations, and cultivated many relationships.
  • Cultivated long-lasting collaborative relationships with executive management within multiple constituencies.
  • Contributed to $7B in revenue gains through advanced technology implementations, consultative sales activities and sustained client partnerships.
  • Designed and deployed Intrusion Prevention System (IPS) on Sprint Customer Data Network.
  • Develop and maintain client relationships.

Show More

6 Ips Jobs

No jobs at selected location

27. GRC

demand arrow
average Demand
Here's how GRC is used in Senior Security Architect jobs:
  • Involved in the implementation of GRC products, SOD mitigation, audit remediation.
  • Worked on the GRC BRM customization to meet Apple's business needs.
  • Create project implementation plan for security audit tool GRC 5.3.
  • Trained functional and technical teams about the GRC tool.
  • Project: SAP Security Implementation and GRC BRM Customization.
  • Lead over 4 GRC Implementations and Upgrades.
  • Experience in implementing GRC in HANA.
  • Installed, configured and implemented GRC.
  • Worked as a GRC (5.3) architect.
  • Configure GRC 5.3 (CUP, RAR, ERM and SPM) on 64 bit Netwaver 2004s.
  • Configured Identity Management and Identity Centre Configured GRC 5.3 RTA (Real Time Agent) in backend systems.

Show More

1 GRC Jobs

No jobs at selected location

28. Siem

demand arrow
average Demand
Here's how Siem is used in Senior Security Architect jobs:
  • Designed and implemented complementary Log Management Solution and integrated into SIEM.
  • Developed and maintained security systems, including VPN, IPS, SIEM and P2P systems.
  • Evaluated (3) different SIEM solutions then issued RFP for production deployment.
  • Monitored and made recommendations for SIEM parser and rule creation and/or adjustments.
  • Developed a cost effective virtualized platform for collecting, storing and forwarding interesting network traffic for SIEM analysis.
  • Engineer, deploy and manage RSA Security Analytics SIEM solution.
  • Developed SIEM (Solarwinds) Process, Procedures and testing in a Testbed and production environment.
  • Architected and deployed Arcsite SIEM and configured customized consoles.

Show More

8 Siem Jobs

No jobs at selected location

29. Linux

demand arrow
average Demand
Here's how Linux is used in Senior Security Architect jobs:
  • Developed and installed IBM/BigFix solution and agents to implement patch management for Microsoft and Linux devices.
  • Install and maintain large scale Linux platforms to provide security, database, web and other services.
  • Performed Linux server systems Administration tasks for Online Produce Application.
  • Deployed patchlink for patch distribution to Microsoft windows NT/2000/2003, Linux, SQL Server 2000, Exchange 2000 and IIS6.0.
  • Worked with, configured and set up both Linux and Solaris boxes.

Show More

30. ISO

demand arrow
low Demand
Here's how ISO is used in Senior Security Architect jobs:
  • Develop corporate vulnerability advisory program.
  • Evaluated existing and coordinated implementation of tailored Patch and Vulnerability Management processes for this isolated system of systems.
  • Work within the framework of established GAP analysis for different business unit's compliance with ISO 27001 Security Policy Standards.
  • Lead KPMG members in an advisory and guidance capacity to ensure remediation with acceptable solution efforts and validation methods.
  • Designed security services and solutions product offerings from concept to execution (ISO 17799 Assessment and CISO Framework).
  • Filled a CISO role, devising and building a global information security operation for enterprise system lines of business.
  • Composed security policies and security controls in based on the ISO27001-2013, NIST SP800-53 R4 and CSA-CCM 3.0.1 standards.
  • Created security advisories, weekly incident breech and situation awareness reports for department heads and incident response teams.
  • Worked with Security Liaisons to define various risks and mitigating controls for the violations using GRC AC tool.
  • Communicate and act as liaison between Project Team, Business, Team, and Implementation partner.
  • Implemented efforts to improve the security infrastructure ISO 27001-5 CobiT 4.0, and Six Sigma processes.
  • Developed team operating procedures in compliance with ISO, HIPAA, PCI, & SOX standards.
  • Establish ITIL-based Change Advisory Board and Architecture Review Board policies and processes.
  • Developed a fully automated build system for the Dragon ISO appliance image.
  • Provide consulting and advisory services to our customers.
  • Utilized best practices including ITIL, TOGAF, ISO/IEC, PCI, NIST SP 800 series, and NISPOM.
  • Cloud Security Practice Development * Provide advisory and subject matter expertise to develop the Cloud Security Practice within the Consulting Stream.
  • Provide essential strategic guidance and direction, architectural consulting and trusted advisor leadership to GE's Executives & Senior Management.
  • Key Achievements: Served as a Liaison between technical and sales professionals, devising customized solutions-driven strategies.
  • Performed Scala Spark Markov Chain Analysis on Apprentice-Intern and Job-Core Pattern Data; using MLib and Mahout isolated pattern features.

Show More

4 ISO Jobs

No jobs at selected location

31. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Senior Security Architect jobs:
  • Network Security Architect design and review, active directory restructuring and management.
  • Design and implement Active Directory, Exchange, SharePoint, MIIS\ILM, System Center, SSO, and other enterprise solutions.
  • Assisted in Security evaluation and recommendations in the deployment of Active Directory for two new spin-off companies from DuPont.
  • Created the architecture for the "Cloud" using Microsoft Active Directory and servers.

Show More

1 Active Directory Jobs

No jobs at selected location

32. Security Standards

demand arrow
low Demand
Here's how Security Standards is used in Senior Security Architect jobs:
  • Lead evaluation, architecture, execution and creation of security standards and policies for Toyota Financial Services virtual and physical environment.
  • Conduct architectural reviews and document security standards to address security issues.
  • Designed an implemented hardened logging infrastructure to meet Fed security standards.
  • Implemented security standards and engaged in security architecture initiatives.
  • Develop detailed technical security standards for infrastructure components.
  • Participated on technologist and architect review board to ensure projects were in compliance with all applicable security standards and policies.
  • Establish Cloud Computing security standards for common platforms, authentication, WAF and data encryption.

Show More

18 Security Standards Jobs

No jobs at selected location

33. Access Control

demand arrow
low Demand
Here's how Access Control is used in Senior Security Architect jobs:
  • Engineered strong authentication architecture and designed control model for access control to web and internal systems.
  • Worked on Securing SAP Sales Force Automation (SFA) users via Access Control Engine (ACE).
  • Designed and developed Identity Access Management (IAM) and Role Based Access Control solutions.
  • Designed, developed and deployed Access Control Engine(ACE).
  • Design the overall security architecture to manage user's lifecycle, Access Control and federation capacity.

Show More

1 Access Control Jobs

No jobs at selected location

34. Internet

demand arrow
low Demand
Here's how Internet is used in Senior Security Architect jobs:
  • Support entire internet backbone, DNS Infrastructure, and enterprise level VPN community for 30,000 users.
  • Research emerging and zero-day threats as they pertain to our Internet properties.
  • Worked daily with security utilities like Internet Security Scanner, Nessus, Satan NMAP to ensure the security of the network.
  • Updated acceptable use standards that medical systems and applications must meet to host live ePHI facing the Internet.

Show More

35. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Senior Security Architect jobs:
  • Used Provider One to manage multiple Checkpoint firewall instances for remote sites for the State of Georgia.
  • Created the engineering and troubleshooting guide for the new checkpoint R77.20 release.
  • Designed, built, and implemented CheckPoint Firewall-1 VSX.
  • Managed Checkpoint firewall cluster and FreeBSD firewall.
  • Deployed and support 40 pairs of Checkpoint 4.1, NGX, VPN-1, Cisco Pix/ASA firewalls around the world.
  • Managed the lab CheckPoint Firewall-1, Connectra R66, Tipping Point 200E, and SecureTrack solutions.

Show More

36. PKI

demand arrow
low Demand
Here's how PKI is used in Senior Security Architect jobs:
  • Integrated PKI system and associated applications into central directory.
  • Planned, designed, and implemented an Enterprise-scale security infrastructure based on PKI technology, including CPS and CP development.

Show More

13 PKI Jobs

No jobs at selected location

37. Ldap

demand arrow
low Demand
Here's how Ldap is used in Senior Security Architect jobs:
  • Planned, designed, and implemented Enterprise directory services, DIT, and schema on X.500/LDAPv3 platform.
  • Redesigned the LDAP directory architecture to include fault tolerance and load balancing technologies.
  • Integrated SAP with IBM Tivoli Identity Manager and LDAP.

Show More

38. ECC

demand arrow
low Demand
Here's how ECC is used in Senior Security Architect jobs:
  • Established the new security architecture for ECC 5.0.
  • Upgrade ECC security from ERP 6.0 EHP 2 to EHP 5.
  • Configured CUP (Compliant User Provisioning) and SPM (Super User Management ) on ECC 5 ECC 6.0 EHP4.

Show More

39. SQL

demand arrow
low Demand
Here's how SQL is used in Senior Security Architect jobs:
  • Created business essential information vault, an MS SQL-based repository which contains detailed information regarding secured data items.

Show More

40. Security Services

demand arrow
low Demand
Here's how Security Services is used in Senior Security Architect jobs:
  • Coordinated and defined processes with any and all vendors needed to deliver security services.
  • Applied change controls, account security services, and audit support for Nextel international markets.

Show More

5 Security Services Jobs

No jobs at selected location

41. Security Products

demand arrow
low Demand
Here's how Security Products is used in Senior Security Architect jobs:
  • Researched and evaluated the latest security products in a real networking environment.
  • Work with the rest of Operations and Product to determine how Security Products fit into the whole IT environment.
  • Presented at Architectural Review Boards on security products for client approval.
  • Implement new security products, including Juniper SSL VPN, DUO, Metasploit, and Nexpose.

Show More

42. Symantec

demand arrow
low Demand
Here's how Symantec is used in Senior Security Architect jobs:
  • Developed and deployed Symantec and Industrial Defender Endpoint products for the environment.
  • Designed and implemented remediation workflows for Symantec customers.
  • Implemented Data Leakage tool, Symantec's Vontu, for US to assess privacy data leakage.
  • Added public sector perspective/expertise as writer for inaugural "Symantec Certified Professional - Cloud" certification.
  • Contributed cloud design expertise for Symantec's OpenStack "Common Cloud Platform" initiative.

Show More

43. RSA

demand arrow
low Demand
Here's how RSA is used in Senior Security Architect jobs:
  • Acted as global RSA ACE and Cisco ACS Team Manager and technical lead for operations, administration and support functions.
  • Managed Entrust Radius server and hardware RSA tokens, providing two factor authentication for remote departments.
  • Configured universal work list (UWL) and deploy IDM connector UWL in the portal.
  • Consolidated 12 RSA ACE server realms with over 20,000 users into one realm.
  • Initial work with implementation consultants from RSA.
  • Implemented Virsa(GRC) Compliance Calibrator, Firefighter, Access Enforcer and Role Expert across a global landscape.
  • Lead the analysis and proof concept workshop about Virsa tool and its applicability.
  • Installed, configured and implemented Virsa(GRC) for 3 business units.
  • Helped in installing Virsa 4.0 and trained QVC personal.

Show More

44. Security Tools

demand arrow
low Demand
Here's how Security Tools is used in Senior Security Architect jobs:
  • Maintain up-to-date knowledge of security threats, countermeasures, security tools and network technologies.
  • Provided input to multiple accounts and Architects using existing and emerging security tools.
  • Engaged in compliance and remediation activities that incorporated the results from security tools.
  • Identified the need for an official network security tools deployment policy.

Show More

45. Risk Analysis

demand arrow
low Demand
Here's how Risk Analysis is used in Senior Security Architect jobs:
  • Served as the technical lead for the enterprise-wide digital security upgrade project, including risk analysis, auditing and regulatory compliance.
  • Provide risk analysis as needed to assist with configuration management using various IA tools such as ACAS.
  • Perform Risk analysis and reviews of existing controls and policies.
  • Perform Risk Analysis to help prioritize risk across our assets.
  • Configured the Rule Architect for RAR (Risk Analysis and Remediation) Created roles for SAP BPC.

Show More

46. AWS

demand arrow
low Demand
Here's how AWS is used in Senior Security Architect jobs:
  • Participated in development of AWS for secure collaboration.
  • Configured and implemented DOLETA.gov s Microsoft Azure Cloud Active Directory Connector to AWS Directory Service to coordinate SSO Authentication.
  • Configured and tuned AWS Cloud Search to establish research data for DOLETA Business Analysis Group.
  • Managed and deployed DOL GovCloud secure web applications using: AWS Elastic Beanstalk.
  • Configured, tested and implemented AWS-VPC & VPN for Government Clients.
  • Reduced overall number of existing application flaws by 70%.
  • Designed modular AWS system architecture enabling rapid, parallel development/prototyping/testing of Symantec security portfolio on Amazon GovCloud.
  • Designed, developed, configured and tuned both Mahout and AWS Machine Learning Models from Scala Spark Markov Chain Analysis Data.
  • Designed, developed, coded and tested customized DOL-AWS GovCloud Node.js Security Monitoring of VPC Zones using AWS - Lambda.
  • Loaded via Elastic-Cache: DOLETA-noSQL Grants Program Document Data; to AWS-DynamoDB; for AWS-EMR Grant Fulfillment Analysis.
  • Integrated AWS-RDS MySQL, Oracle and Aurora DBs to AWS-Hive EMR using DynamoDB with direct connect VPC-to-VPC.
  • Assisted in the preparation and maintenance of NERC CIP Reliability Standard Audit Worksheets (RSAWs).
  • Converted continual streaming eDRVS-CSV data to JSON format; using AWS EMR Cast/Convert Ruby Code.
  • Established and maintained AWS GovCloud with additional services: CloudSearch, Kinesis and Machine Learning.
  • Evaluated AWS cloud for FedRAMP, GovCloud and DoD SRG compliancy for civilian agency.
  • Coordinated monitoring of AWS Mgt Console, Ambari, HUE and Zookeeper performance metric levels.

Show More

47. RFP

demand arrow
low Demand
Here's how RFP is used in Senior Security Architect jobs:
  • Develop proposals to meet the RFQ/RFP requirements for Certification & Accreditation, Risk Identification and Management.
  • Designed Request for proposal-(RFP) and Request for Information - (RFI).
  • Generated and sold proposals and RFP responses to many large scale companies.
  • Authored several RFP and RFI sections for secure mobility and cloud operations.
  • Supported RFP s and developed solutions to meet client security requirements.

Show More

48. BI

demand arrow
low Demand
Here's how BI is used in Senior Security Architect jobs:
  • Change management, vulnerability controls and requirement for imposing separation of duties within the application.
  • Project included process, control, contract, architectural and vulnerability recommendations.
  • Conduct ethical pen test to identify and mitigate application vulnerability.
  • Developed secure mobile key storage architecture for Samsung.
  • Oversee vendor remediation activities of vulnerabilities.
  • Recorded progressive and sustainable results, ensuring all customer needs are identified and met to increase business growth and profitability.
  • Included IPv6 packet header inspection, updates to various Dragon decoders, and the ability to decode IP-in-IP tunnels.
  • Created how - to design patterns for cross site scripting, SQL, injection and PATH manipulation vulnerabilities.
  • Worked as lead security architect on several projects with responsibilities for managing the various pieces of the project.
  • Team responsibilities include Provisioning, Project Management, Project Plans, SSO and web based access management.
  • Represented the enterprise system lines of business on daily calls to address vulnerabilities.
  • Mentored junior members of the security team to improve overall team capabilities.
  • Identified vulnerability in current data loss prevention (DLP) solution.
  • Analyzed mobile and cloud security markets and performed competitive and performance analysis for Saturnus Cloud Security application.
  • Proof of concepts/ product evaluations Reduced exposure and liability to the organization by providing a Defense-In-Depth strategy.
  • Manage and maintain GMAC Vulnerability and Security Compliance Program processes and technologies utilizing Qualys and RedSeal.
  • Key Accomplishments: Championed security metrics development and reporting to drive visibility and quality improvements.
  • Led Proof-of-Concept for a Biometrics authentication engagement during a corporate merger & acquisition.
  • Developed and maintained SAP Security process design and maintains birth right roles for use Change Control team providing future roadmap.
  • Reduced application vulnerabilities and recoding by over 30%.

Show More

1 BI Jobs

No jobs at selected location

49. HR

demand arrow
low Demand
Here's how HR is used in Senior Security Architect jobs:
  • Developed code review, vulnerability and penetration program testing to ensure web/application code integrity through the use of Static/Dynamic code review.
  • Shape the art & practice of Enterprise Security Architecture at GE through continuous improvement of our people, processes and technologies.
  • Restricted HCM sensitive data like Social Security Number, Date of Birth and Marital Status for HR security.
  • Use agile design methodology to break down software design cycle to shorter duration averaging three to four weeks.
  • Advanced research on mitigation and exploitation of advanced threats on Enterprise networks, windows, and UNIX derivatives.
  • Schedule background jobs every hrs to generate and send email notification for fire fighter activity log reports.
  • Develop vulnerability, compliance and risk management programs for secure financial, HR and Consumer credit transactions.
  • Establish and maintain security architecture requirements and standards that keep up with the latest emerging security threats.
  • Performed threat analysis and determined critical business processes and priorities as part of a Business Impact Analysis.
  • Ensured that our systems are maintained and hardened against, outside threats and standards
  • Assist HR and Legal department in fraud investigation, legal hold and e-discovery.
  • Integrated threat intelligence feeds with ArcSight to provide contextual relevance for security events.
  • Engage with Risk Management to ascertain threats and work on mitigation strategies.
  • Provide Training and Education for global threat intelligence, offerings, etc.
  • Designed and implemented a security solution utilizing SAP's three tier approach.
  • Map MHF's use case requirements into threat scenarios.
  • Reduced purchasing costs 18% through enhanced sourcing.
  • Utilized and integrated Apache Kafka Hadoop Message Handlers with Storm for high-availability through-put.
  • Managed personnel to remediate risk, threats, and vulnerabilities (SOC and Operational Teams).
  • Managed and was accountable for sales throughout the entire US, Brazil and Puerto Rico.

Show More

50. Saas

demand arrow
low Demand
Here's how Saas is used in Senior Security Architect jobs:
  • Performed SaaS evaluations for corporate solutions, including SOC2 and architecture assessments.
  • Educated and trained clients on cloud computing services, private/public/hybrid cloud, IAAS, PAAS and SAAS.
  • Designed a secure private cloud application hosting module for Docker-based SaaS platforms.
  • Designed the AWS hosted Security SaaS environment for manpower systems.
  • Participate in design of SaaS/Cloud offerings.
  • Lead several cloud, SaaS, IaaS projects as technical lead and/or security architect Mentored 10 architects, developers and managers

Show More

Senior Security Architect Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Security Architect

Architecture

13.1%

Ensure Compliance

10.4%

Infrastructure

8.8%

Firewall

8.0%

Information Security

6.4%

Security Policies

5.9%

Security Audits

4.7%

Cloud

4.5%

Risk Assessments

4.3%

SOX

3.9%

Pci-Dss

3.9%

Security Requirements

3.6%

Recovery Procedures

3.3%

Security Solutions

3.2%

Nist

2.9%

Governance

2.8%

Hipaa

2.7%

VPN

2.6%

Cyber

2.6%

SME

2.5%
Show More

Typical Skill-Sets Required For A Senior Security Architect

Rank Skill
1 Architecture 8.6%
2 Ensure Compliance 6.8%
3 Infrastructure 5.8%
4 Firewall 5.2%
5 Information Security 4.2%
6 Security Policies 3.9%
7 Security Audits 3.1%
8 Cloud 3.0%
9 Risk Assessments 2.8%
10 SOX 2.5%
11 Pci-Dss 2.5%
12 Security Requirements 2.4%
13 Recovery Procedures 2.2%
14 Security Solutions 2.1%
15 Nist 1.9%
16 Governance 1.8%
17 Hipaa 1.7%
18 VPN 1.7%
19 Cyber 1.7%
20 SME 1.6%
21 Incident Response 1.6%
22 Access Management 1.6%
23 Business Requirements 1.6%
24 Application Security 1.6%
25 IDS 1.5%
26 Ips 1.5%
27 GRC 1.5%
28 Siem 1.4%
29 Linux 1.3%
30 ISO 1.2%
31 Active Directory 1.2%
32 Security Standards 1.2%
33 Access Control 1.1%
34 Internet 1.1%
35 Checkpoint 1.1%
36 PKI 1.0%
37 Ldap 1.0%
38 ECC 1.0%
39 SQL 1.0%
40 Security Services 1.0%
41 Security Products 1.0%
42 Symantec 1.0%
43 RSA 1.0%
44 Security Tools 1.0%
45 Risk Analysis 1.0%
46 AWS 0.9%
47 RFP 0.8%
48 BI 0.8%
49 HR 0.8%
50 Saas 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

12,255 Senior Security Architect Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.