Cyber Architect

  • CVL
  • Newbury, West Berkshire, UK
  • 09/09/2016
Testing

Job Description

Responsibilities • Lead security architecture/designdocumentation and approve deliveries based on assessments for multiple projects, based on requests from various stakeholders, delivery managers, and additional requestors. The skills required would be: o IP design understanding o IP/ OS vulnerability knowledge o Firewall/ Zoning knowledge o Infrastructure (Physical/ virtual machine) deployment knowledge • Capture, document, and prioritize identified risks and associated threat models for technical and non-technical stakeholders, which span: o Infrastructure provisioning, configuration, and (security) operational requirements o Identity & Access Management (Authentication, Authorization, Auditing) o Network Security (provisioning and architecture of components such as firewalls, IDS, etc., policy management, process for enabling analytics) o Application Security (Middleware, sessions, secure code, vulnerability assessments, penetration testing, encryption) • Develop, review, audit, and update security reference architecture / security blueprints utilizing an analytical, threat-centric approach that identifies potential attack surfaces, and likely attack vectors • Strategic assessment and evaluation of security solutions (network security components, host/endpoint management tools, security analytics solutions) for adoption, deployment, and/or customization across the organization • Participate in governance & compliance processes relating to IT, Network, and Operations security domains Experience Required • Experience with IAM solutions, deployments, and technologies (SAML, Kerberos, LDAP/AD, etc.) as well as encryption mechanisms, key management, and practical deployments • Experience with solutions/technologies for host-based security, OS hardening, DLP, and endpoint monitoring / patch management • Experience with Firewalls, IDS/IPS, VPN, and other network security components from an evaluation, deployment assessment, and audit perspective • Vulnerability Assessment, Penetration Testing, and Threat Modeling background with experience using numerous tools/technologies/methodologies • Knowledge and experience in designing database and data lake architectures • Detailed knowledge and experience of application, network, and platform vulnerabilities; ability to explain these to technical management • 7+ years of relevant work experience, including client-facing roles and working with large organizations Desired • Experience with asset discovery and security analytics • Knowledge and experience with cyber kill chain, defense in depth, and similar concepts • Knowledge and experience with various standards (PCI/DSS, SOX, HIPAA etc.) • Bachelors in Computer Science or equivalent degree/work experience • CISSP, CISA, SANS GCIH or GCFA, CISM, CCSK certifications a plus