Cyber Security Architect - BridgeView
Denver, CO 80201
About the Job
SUMMARY
Bridgeview is currently seeking an Cyber Security Architect for one of our clients. If you love building and supporting technology solutions that make businesses successful, then read on for more details.
TITLE: Cyber Security Architect
LOCATION: Remote
Cyber Security Architect with experience defining and assessing the organization's security strategy, architecture and practices. Required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services.
ESSENTIAL DUTIES & RESPONSIBILITIES include the following: other duties may be assigned.
- Develops security strategy plans and roadmaps based on sound enterprise architecture practices for all environments including cloud and on-premise infrastructure.
- Develops and maintains security architecture artifacts (e.g., models, templates, standards and procedures) leveraging the Enterprise Architecture tool that can be used to understand and integrate security capabilities in projects and operations.
- Develops standards and assist in developing practices for data encryption and tokenization in the organization, based on the organization's data classification criteria.
- Drafts architecture security standards to be reviewed and approved by executive management and/or formally authorized by the Chief Information Security Officer (CISO).
- Documents and addresses organization's information security, cybersecurity architecture, and systems configuration and security engineering requirements throughout the acquisition life cycle.
- Performs security reviews, identifies gaps in security architecture, and develops a security risk management plan.
- Validates IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable.
- Coordinates with the Enterprise Architecture team to develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
- Collaborates with the IT teams to define baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, identity and access management (IAM), and cloud deployments.
- Coordinates with the privacy officer or office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization).
- Liaises with the vendor management (VM) team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data for third-party providers.
- Evaluates the statements of work (SOWs) and master services agreements (MSAs) for these providers to ensure that adequate security protections are in place. Assesses the providers' audit reports for security-related deficiencies and required "user controls" and report any findings to the CISO and vendor management teams.
- Liaises with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls.
QUALIFICATIONS
- Knowledge and experience with financial regulations such as Payment Card Industry Data Security Standard (PCI-DSS), Sarbanes-Oxley (SOX)
- Privacy Practices
- Gramm-Leach-Bliley Act (GLBA)
- NIST Cybersecurity Framework (CSF)
- Center for Internet Security (CIS) Critical Security Control
- Other cyber security frameworks, architecture, and technology
- Experience in using architecture frameworks such as The Open Group’s TOGAF
- Direct, hands-on experience or strong working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology, and vulnerability management tools
Full-stack knowledge of IT infrastructure:
- Applications
- Databases
- Operating systems — Windows, Unix and Linux
- Hypervisors
- IP networks — WAN and LAN
- Storage networks — Fibre Channel, iSCSI and NAS
- Backup networks and media
- Containers/Kubernetes
- Public cloud services
- Securing public cloud services
EDUCATION & EXPERIENCE
- Bachelor's or Master's degree in computer science, information systems, cybersecurity or a related field. Is required.
- 1-3 years’ Experience as a Cybersecurity Architect or Engineer designing or building multiple components of an IT or cybersecurity infrastructure.
- Certified Information Systems Security Professional preferred or
- Certified Information Systems Auditor preferred or
- Certified Information Security Manager preferred or
- Global Information Assurance Certification preferred
ABOUT BRIDGEVIEW
BridgeView is a talent and technology consulting company that helps business leaders build exceptional technology teams and deliver complex projects with confidence.
Since 2005, BridgeView's tenured recruiting team has built a vast network of niche technologists and executive leadership candidates to help our clients solve their most complex talent challenges. Paired with strategic consulting services, BridgeView further delivers project collaboration in the areas of people, process, and technology.
This blended approach allows clients to adjust in realtime to align with their budgets while receiving Big 5 expertise to meet their objectives.
BridgeView. Within Sight.
We are an equal opportunity employer and value diversity. All employment decisions are made due to qualifications, merit, and business need. The successful candidate’s starting salary will be determined based on permissible, non-discriminatory factors such as skills, experience, and geographic location.