Share resumes at brijes...@kenfill.co                

Senior Cyber Security Architect-NSEE

Location: Charlotte, NC, US

Position Summary

The Cybersecurity  Architect will be responsible for  translating security 
requirements 
into system tenets and repeatable design strategies, and patterns based on 
security architecture standards. The Cyber Security Architect will 
collaborate with the application development, Infrastructure, IoT and 
business units across Sealed Air  to integrate cybersecurity services. The 
successful candidate will be responsible for designing security solutions 
that protect the business, but also allow the business to execute and 
innovate.

The cybersecurity architect will provide expert technical guidance for 
addressing 
current security issues, but has the foresight to see where the industry is 
headed and proactively deliver optimal secure solutions. The architect is 
expected to think like an adversary and identify how solutions should 
evolve as the threat landscape changes. Also, the chosen candidate must be 
a self-starter capable of multitasking and efficiently managing their time 
in a dynamic environment with demanding deadlines while requiring minimal 
levels of supervision. This position reports  to Enterprise Architecture 
Team with dotted line to Cybersecurity Engineering & Operations Team.

Job Description Cont. 

Responsibilities/Duties

*     Possess a DevOps focus across technology and security architecture, 
automation, 
integration and distribution.
*    Reviews existing security architecture, identifies design gaps, and 
recommends 
security enhancements
*    Stays abreast of current and emerging security threats and designs 
security 
architecture to mitigate them
*    Ensures alignment between security architecture frameworks, standards 
and overall business strategy
*    Influence the planning and execution of incident response and postmortem 
exercises, with a focus on creating measurable benchmarks to show
progress (or deficiencies requiring additional attention).
*    Serves as an information security expert and trusted advisor to partners 
in technical and non-technical business units
*    Represents department in Enterprise initiatives and planning; and assist 
with technology strategic roadmap development while ensuring cybersecurity 
capabilities & technical controls are incorporated 
*    Collaborate and drive key requirements through governance bodies such 
as Architecture Review Board, and Change Review Board

Qualifications 

Required Skills & Experience

*    Should have  in depth experience with Firewall engineering concepts(such 
as CISCO, Palo Alto), security forensics and incident response.
*      Intermediate knowledge of cyber defense mitigation techniques and 
vulnerability 
assessment tools, including open source tools, and their capabilities.
*      Intermediate knowledge of cryptography and cryptographic key management 
concepts,  penetration testing principles, tools, and techniques
(e.g., metasploit, neosploit).
*     Intermediate knowledge of system and application security threats and 
vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, 
Procedural Language/Structured Query Language [PL/SQL] and injections, race 
conditions, covert channel, replay, return-oriented attacks, malicious 
code).
*    Intermediate  knowledge of system administration, network, and operating 
system hardening techniques.
*     Intermediate skill in using incident handling methodologies.
*    Strong organizational and interpersonal skills needed to work effectively 
with a wide variety of internal and external resources.
*    Strong decision-making skills and ability to work under pressure
*    At least 5 to 8+ years' experience in technical network/cyber security 
engineering with a background governance risk and compliance
*    Experience architecting SIEM systems, threat intelligence platforms, 
security 
automation and orchestration solutions, IDS/IPS, file integrity monitoring 
(FIM), data loss prevention (DLP) and other network and system monitoring 
tools.
*    Proved track record of delivering technical security such as PKI, Identity 
and access management (IDAM) systems, Endpoint security (antivirus,
endpoint detection and response- EDR), security automation and 
orchestration and deception technologies and  controls.
*    Working knowledge of TOGAF and SABSA methodologies for creation of 
baseline 
and target architectural blueprints
*    Deep insight into Cloud - IAAS and PAAS Security Controls (AWS, Azure, 
GCP, VMware).
*    IAM: Authentication, Authorization, MFA, Federation with Active 
Directory.
*    Infrastructure Security and Integrity: Infrastructure Segmentation, 
Operating 
Systems and Application Repository, Server Security - Secured
Enhanced Linux (RHEL), File Integrity / Data Tamper Monitoring, 
Network/Security 
Monitoring.
*    Experience with one or more general purpose programming languages 
including 
but not limited to:  Java, C/C++, C#, Objective C, Python, JavaScript.
*    Experienced with Threat Modelling tools for Enterprise, mobile and web 
apps.
*    Understands Static Code Analysis, Dynamic Code Analysis, 
Penetrationtesting 
and has helped companies remediate coding vulnerabilities and issues.
*    Perform security related services and process assessments and evaluations 
based on NIST, OWASP, NIST, PCI-DSS, CWE/SANS, CSA guidelines.


*Best Regards,*

*Brijesh Kumar *

*USA : 219-209-4155 *

-- 
You received this message because you are subscribed to the Google Groups 
"CorptoCorp" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to corptocorp+unsubscr...@googlegroups.com.
To post to this group, send email to corptocorp@googlegroups.com.
Visit this group at https://groups.google.com/group/corptocorp.
For more options, visit https://groups.google.com/d/optout.

Reply via email to