📁
IT Operations & Systems
📅
210871 Requisition #
📅
2982 Total Views

 

http://ohdcorporation.com/

 

About the Position
The Security Architect is a key member of the IT security organization and will report to the Director, Information Security, and Compliance. This position is responsible for the day-to-day operations of the security, management, and administration of all security systems and tools, identification, investigation, resolution of security incidents. Other tasks will include leading the team of security analysts, help design the security systems and strategy, participating in the creation and maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and other technical assessments.


The Security Architect role is responsible for the design, implementation, and perform vulnerability and penetration tests and recommend controls necessary to ensure and protect the safety and security of information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destruction. Perform, security audits and take corrective actions to mitigate risks. Monitor for and respond to critical application and system vulnerabilities. Develop and participate in incident management and system investigation efforts within established protocols and legalities. The successful candidate will have extensive knowledge of technology offerings, including emerging technologies, and should have exceptional hands-on experience in implementing and using technology and security platforms/solutions. The candidate will also be familiar with secure application architecture/design. This individual must be detail and process-oriented and must demonstrate problem-solving abilities.
 

Responsibilities:
• Develop and support a complex security architecture that includes IDS/IPS, next-generation firewalls, web filtering, network access control, Holistic DLP, encryption, endpoint protection, sandboxing solutions, segmentation, vulnerability management, event monitoring, and forensic analysis.

• Architects, designs, implements, maintains, operates system security controls & countermeasures, supports new security technologies, and make recommendations.

• Monitors and responds to security incidents and vulnerabilities, including investigation, countermeasures, and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement.

• Develop and execute incident response plans including incorporating lessons learned into the enterprise security strategy and initiatives roadmap, identify the root cause, drive mitigation to prevent future occurrences, develop monitoring and visibility capabilities; report on incidents, vulnerabilities, and trends.

• Assist in mitigating future threats and closing gaps through analysis of recurring incident trends - maintain incident metrics and assist in reporting to leadership.

• Perform internal and external penetration tests, ethical hacking, network/system forensics, and security auditing.

• Develops and administers, or provides advice, evaluation, and oversight for information security training and awareness programs, conduct phishing, social engineering, and tabletop exercises to simulate threats.

• Enforce the company’s security policies and mitigate security risks to preserve confidentiality, integrity, and availability of systems.

• Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.

• Review systems and processes for compliance with information security standards.

• Perform security assessments to identify, prioritize, document, and communicate findings to relevant stakeholders.

• Administer and ensure operational efficiency and effectiveness of diverse information security tools.

• Support security events monitoring and incident response efforts whilst ensuring rapid detection and containment of security events of concern.

• Assist with the delivery of KRIs and KPIs by collecting and translating relevant threat, vulnerability, and risk data into insight.

• Foster a sense of community with other team members through open communication, collaboration, and knowledge sharing.

• Other duties as assigned.

 

 

 

 

 

Core Competencies:

• Experience in the following areas: Active Directory, Microsoft Azure security (Intune, Conditional Access policies with Azure including MAM and MAMWE), Database security concepts, eDiscovery, Endpoint security concepts, Encryption, Identity Management, Log Management, Email Security, Web content filtering, Patch Management, Risk Assessment, and security principles/best practices.

• Experience working with diverse security products and methodologies (Vulnerability Scanning, Penetration Testing, Application testing).

• Demonstrated experience in applying emerging technologies to develop secure solutions across diverse network/communication protocols.

• Knowledge in various frameworks such as NIST CSF and CIS.

• Ability to multi-task, effectively structure work to handle multiple demands and competing activities.

• Must demonstrate strong ethics, influence, negotiation, interpersonal skills, communication, and the ability to effectively manage stress and engage in continuous learning by staying current with relevant technology and innovation.

• Exceptional written and verbal communication skills, with the ability to explain complex technical problems to a wide range of vendors and coworkers.

• A passion for innovation in cybersecurity, problem-solving nature, ability to work under pressure, change directions and work on the fly.

• Must have the proven ability to think outside the box and always seeking innovative ways of delivering highly functional and effective technical security solutions

• Communication skills: This individual must be able to identify and communicate security issues of greatest concern effectively.

• Ability to deliver: This individual will have the proven ability to lead large, complex projects across various business and functional departments as they pertain to risk and security matters.

• Big picture: Able to extend the application of principles beyond Security for IT on a truly enterprise risk and enablement basis while demonstrating in measurable terms the contribution of security to the enterprise at all levels and in all business domains.


Qualifications:

• Bachelor's Degree in Information Systems/ Computer Science or 10 + years equivalent work experience.

• A minimum of 8 years' experience in Information Security is required.

• Significant experience building a security reference architecture for IT Infrastructure, Enterprise applications, cloud deployments, and hybrid scenarios.

• CISSP / GIAC / CEH or other security certifications preferred or demonstrated progress towards relevant security certifications.

• Experience identifying and communicating security weaknesses in legacy deployments.

• Demonstrated ability to skillfully transfer knowledge to colleagues and coach junior staff.

 

You demonstrate these behaviors:

• Curious: Expected to be a constant learner, creative thinker who is deeply interested in the latest security developments and tools.

• Innovative: Defines a compelling vision of the future, and develops breakthrough ideas, whether big or small, that support that vision.

• Overcomes Barriers: Takes responsibility for addressing obstacles that hinder our people and our business.

• Delivers Results: Delivers positive results regardless of circumstances, utilizing the right mix of analysis, judgment, agility, and urgency.

 

Bonus points if:
• Experience in scripting languages like Python, PowerShell, PHP, etc.,
• Development experience or contributed to open-source projects.
• Experience with automation and orchestration tools.

 

Previous Job Searches

My Profile

Create and manage profiles for future opportunities.

Go to Profile

My Submissions

Track your opportunities.

My Submissions

Similar Listings

Texas, Lewisville, United States

📁 IT Operations & Systems

Requisition #: 211290

Texas, Lewisville, United States

📁 IT Operations & Systems

Requisition #: 211094

Texas, Lewisville, United States

📁 IT Operations & Systems

Requisition #: 211299

At Overhead Door Corporation, we recognize people as the core of our strength. We offer our employees a collaborative culture and the opportunity to make the most of your talents. Join our team to earn bragging rights by belonging to an industry leading, world class organization. If you are interested in becoming part of a Powerful team of People, view our career opportunities!


Overhead Door Corporation is proud to be an Equal Employment, Affirmative Action employer of talented people who make things happen –a powerful and diverse team that includes women, minorities, individuals with disabilities and covered veterans.


Overhead Door is proud to be a drug free environment.


The following link provides more information regarding the Federal laws prohibiting discrimination in employment: EEO is the Law – Notice of Applicant Rights Under the Law

www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf


In compliance with the ADA Amendments Act (ADAAA), Overhead Door Corporation offers accommodations for individuals with disabilities that want to apply for a position. Request disability accommodations:

Phone: 469-549-7100 E-mail: accommodation_request@overheaddoor.com