Sr Security Architect
Western & Southern Life

Cincinnati, Ohio

Posted in Insurance


This job has expired.

Job Info


Overview

Summary of Responsibilities:

The Senior Security Architect is responsible for defining the vision, guiding principles, and strategy that enables the enterprise to implement and deploy security solutions and capabilities that are clearly aligned with business, technology and threat drivers. Provides expert leadership to project teams and provides guidance to Security Architects that lead security consultations for enterprise initiatives, delivering convincing recommendations to business and senior-level IT stakeholders. Responsible for developing security strategic plans and roadmaps based on sound enterprise architecture practices. Develops and maintains security architecture artifacts (e.g., models, templates, and architectural diagrams) that can be used to drive security capabilities in projects and operations. Tracks developments and changes in the digital business and threat environments to ensure that they're adequately addressed in security strategy plans and architecture artifacts. Works with minimal supervision and is responsible to independently make a broad range of critical decisions, escalating to manager only when appropriate.
Responsibilities

Position Responsibilities:

• Defines vision, guiding principles, and strategy for Security Architects that enables the enterprise to implement and deploy security solutions and capabilities that are clearly aligned with business, technology and threat drivers.

• Leads in developing security strategic plans and roadmaps based on sound enterprise architecture practices. Tracks developments and changes in the digital business and threat environments to ensure that they're adequately addressed in security strategy plans and architecture artifacts.

• Provides leadership to Security Architects and key IT and business stakeholders in the development of information security architectural principles, guidelines and practices that can be leveraged across the organization.

• Provides guidance to security architects on information security consultations. Ensures new projects align (fit and function) with the strategic direction of Information Security and integral touch points with Enterprise Architecture, Data Architecture and Infrastructure teams. Analyzes, documents, and reports on IT business processes and trends to recommend security enhancements and improvements.

• Develops and maintains security architecture artifacts (e.g., models, templates, and architectural diagrams) that can be used to drive security capabilities across the organization.

• Evaluates the external threat landscape, providing leadership regarding replacement or augmentation of existing tool capabilities in order to better secure business systems and data from inside and outside threats.

• Serves as a technical expert and project team member for cybersecurity tool selection and implementation projects, supporting the system and integration project tasks when needed.

• Defines architectural guidance and provides leadership on best practices regarding security in software development, user interface design frameworks, high performance messaging solutions, server side development, integrations and tools and technologies.

• Develops and communicates the framework for threat modeling, static application security testing, code reviews, and secure design reviews for high risk applications.

• Determines testing requirements and strategies, automates security testing using a variety of scripting and open source tools.

• Works with Security Engineering to drive solution identification, feasibility analysis, and implementation recommendations for operational service level improvements. Works as a member of project teams to collectively drive implementation projects from inception through completion.

• Plans, designs, deploys and helps integrate IT security systems into corporate computing environments including systems used for logging, monitoring, intrusion detection, centralized cybersecurity knowledge base, and behavioral analysis.

• Performs as the technical and strategic expert in multiple, highly specialized areas of Information Security. Promotes visibility and informal education to other IT groups such as Enterprise and Data Architecture, Infrastructure teams, and Development teams as appropriate.

• Monitors emerging technology trends and the security risks associated with those technologies. Makes recommendations for future-state improvements in tools, technology, process, automation and orchestration enhancements and improvements.

• Serves as technical expert in supporting Cybersecurity Operations in high priority cyber investigations.

• Participates in after-incident lessons-learned meetings to give input on recommendations for additional tools or other mitigations for future incidents.

• Tracks service availability and performance metrics, and provides timely updates to management.

• Performs other duties as assigned by management.
Qualifications

Selection Criteria:

• Proven extensive experience on both Linux-based and MS Windows-based system platforms with a strong IT technical understanding and aptitude for analytical problem-solving.

• Demonstrated strong understanding of Enterprise, network, system and application-level security issues.

• Proven extensive experience with system hardening processes, tools, guidelines and benchmarks.

• Proven strong understanding of the current vulnerabilities, response and mitigation strategies used in cybersecurity.

• Demonstrated excellent verbal and written communication skills, interpersonal and collaborative skills with the ability to convey complex concepts and security and risk-related information to internal and external customers (technical and non-technical) at all levels in a clear, accurate, focused and concise manner, and presentation style. Verbal and written communications are to conform to proper rules of punctuation, grammar, diction and style.

• Demonstrated experience effectively influencing a group to a recommended course of action.

• Proven leadership, interpersonal skills and ability to work cross-functionally and to develop associates in their skills and proficiency, while achieving tactical and strategic goals.

• Demonstrated poise and ability to act calmly and competently in high-pressure, high-stress situations.

• Proven strong quantitative and analytical skills, including demonstrated experience identifying, defining, and resolving complex programs, and collecting or interpreting data to establish facts and draw valid conclusions to provide effective resolutions. Proven experience with sound decision-making and critical thinking skills when dealing with multiple alternatives. Must demonstrate the ability to conceptualize and apply new methodologies.

• Proven experience in working with complex programs, which require identifying complex data and analyzing the quality of the output provided.

• Demonstrated ability to manage multiple projects under strict timelines, within budget and financial targets and with appropriate resource management as well as the ability to work well in a demanding, dynamic environment and meet overall objectives.

Work Setting:

• This position works in an office setting and remains in a continuously stationary position for long periods of time while working at a desk, on a computer or with other standard office equipment or while in meetings.

• Requires visual acuity to read a variety of correspondence, reports and forms, and to prepare and analyze data in an accurate, neat and thorough manner.

• Continuously makes repetitive motions of the wrists, hands and/or fingers.

Educational Requirements:

  • Bachelor's degree with eight to ten years' professional experience in Information Security (additional years considered in lieu of degree).

Computer Skills and Knowledge of Hardware & Software Required:

• Linux-based and MS Windows-based system platforms.

• Strong understanding of Enterprise, network, system and application-level security issues.

• Strong understanding of Enterprise computing environments, systems, applications and a strong understanding of TCP/IP networks.

• Fundamental or greater understanding of encryption technologies.

• Scripting skills preferred (examples include Python, Perl, JavaScript, PowerShell).
  • Proven experience in Identity & Access Management practices, systems and controls.
  • Proven experience in project planning and execution experience.
• Strong experience with security tools including but not limited to IDS, IPS, data analytics software, SIEM solutions (QRadar preferred), WAF, knowledge-based platforms, and live response/forensics tools highly desired.

Certifications & Licenses (i.e., Series 6 & 63, CPA, etc.):

• Candidate is expected to hold one or more of the following security certifications: Certified Information Systems Security Professional (CISSP), GIAC Security Expert (GSE), ISACA certifications including CRISC, CISM, CISA, or CGEIT. Series 99 certification a plus.

Position Demands:
  • Extended hours required during peak workloads or special projects and off-hour support.
  • Occasional travel may be required.


This job has expired.

More Insurance jobs


Proassurance
Charlotte, North Carolina
$18.60 - $30.69 per hour
Posted about 12 hours ago

Proassurance
Carmel, Indiana
$47,937.00 - $79,103.00 per year
Posted about 12 hours ago

Blue Cross Blue Shield of Michigan
Grand Rapids, Michigan
Posted about 11 hours ago

Get Hired Faster

Subscribe to job alerts and upload your resume!

*By registering with our site, you agree to our
Terms and Privacy Policy.