Mobile_menu_button_hd

Information Security Architect

CRG

Description


Information Security Architect
Location: Charlotte, NC (28262)
Duration: 6 months +

Interview process:

  • Skype
  • Final interview onsite



Responsibilities

      • Assist development team to design, build and implement enterprise-class secured web applications
      • Align standards, frameworks and security with overall business and technology strategy
      • Identify and communicate current and emerging security threats
      • Design security architecture elements to mitigate threats as they emerge
      • Create solutions that balance business requirements with information and cyber security requirements
      • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
      • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
      • Train users in implementation or conversion of systems
      • Scan the product using tools, scripts and techniques before every delivery to identify vulnerabilities and report them to all the stake holders


Required Technical Skills

      • Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.
      • Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
      • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
      • Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
      • Identifying security gaps in applications deployed on Docker containers on-prem or in the cloud
      • Tighten the security of web deployments on Kubernetes (Role Based Access Control, Service Account, Cluster Role Bindings, etc)



Experience with and knowledge of

      • Java/J2EE, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.
      • Windows and UNIX
      • Penetration testing tools like Burp Suite, OWASP ZAP and the likes
      • Writing code to exploit web application vulnerabilities
      • Linux Kali and its usage to identify vulnerabilities
      • Network and Infrastructure security


General skills required

      • Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
      • Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
      • Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
      • The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background



Certifications preferred

      • Certified Information Systems Security Professional (CISSP)
      • Certified Information Security Manager (CISM)
      • Certified Information Systems Auditor (CISA)
      • Information Systems Security Architecture Professional (ISSAP)
      • Information Systems Security Engineering Professional (ISSEP)
      • Certified Ethical Hacker (CEH)



Information Security Architect
Location: Charlotte, NC (28262)
Duration: 6 months +

Interview process:

  • Skype
  • Final interview onsite


Category Code: JN038, JN008

Requirements

Required Technical Skills

Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.
Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
Identifying security gaps in applications deployed on Docker containers on-prem or in the cloud
Tighten the security of web deployments on Kubernetes (Role Based Access Control, Service Account, Cluster Role Bindings, etc)

Experience with and knowledge of

Java/J2EE, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.
Windows and UNIX
Penetration testing tools like Burp Suite, OWASP ZAP and the likes
Writing code to exploit web application vulnerabilities
Linux Kali and its usage to identify vulnerabilities
Network and Infrastructure security

General skills required

Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background
Apply
Apply

Job Snapshot

Location US-NC-Charlotte
Employment Type Full-Time
Pay Type Year
Pay Rate N/A
Store Type Banking, Information Technology

Recommended Jobs for You

Privacy Tips

For your privacy and protection, when applying to a job online:

Never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction.

Terms & Conditions
Snapshot
CRG
Company:
US-NC-Charlotte
Location:
Full-Time
Employment Type:
Year
Pay Type:
N/A
Pay Rate:
Banking, Information Technology
Store Type:

Description


Information Security Architect
Location: Charlotte, NC (28262)
Duration: 6 months +

Interview process:

  • Skype
  • Final interview onsite



Responsibilities

      • Assist development team to design, build and implement enterprise-class secured web applications
      • Align standards, frameworks and security with overall business and technology strategy
      • Identify and communicate current and emerging security threats
      • Design security architecture elements to mitigate threats as they emerge
      • Create solutions that balance business requirements with information and cyber security requirements
      • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
      • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
      • Train users in implementation or conversion of systems
      • Scan the product using tools, scripts and techniques before every delivery to identify vulnerabilities and report them to all the stake holders


Required Technical Skills

      • Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.
      • Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
      • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
      • Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
      • Identifying security gaps in applications deployed on Docker containers on-prem or in the cloud
      • Tighten the security of web deployments on Kubernetes (Role Based Access Control, Service Account, Cluster Role Bindings, etc)



Experience with and knowledge of

      • Java/J2EE, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.
      • Windows and UNIX
      • Penetration testing tools like Burp Suite, OWASP ZAP and the likes
      • Writing code to exploit web application vulnerabilities
      • Linux Kali and its usage to identify vulnerabilities
      • Network and Infrastructure security


General skills required

      • Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
      • Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
      • Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
      • The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background



Certifications preferred

      • Certified Information Systems Security Professional (CISSP)
      • Certified Information Security Manager (CISM)
      • Certified Information Systems Auditor (CISA)
      • Information Systems Security Architecture Professional (ISSAP)
      • Information Systems Security Engineering Professional (ISSEP)
      • Certified Ethical Hacker (CEH)



Information Security Architect
Location: Charlotte, NC (28262)
Duration: 6 months +

Interview process:

  • Skype
  • Final interview onsite


Category Code: JN038, JN008

Requirements

Required Technical Skills

Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.
Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
Identifying security gaps in applications deployed on Docker containers on-prem or in the cloud
Tighten the security of web deployments on Kubernetes (Role Based Access Control, Service Account, Cluster Role Bindings, etc)

Experience with and knowledge of

Java/J2EE, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.
Windows and UNIX
Penetration testing tools like Burp Suite, OWASP ZAP and the likes
Writing code to exploit web application vulnerabilities
Linux Kali and its usage to identify vulnerabilities
Network and Infrastructure security

General skills required

Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background
Information Security Architect Apply now