What are the responsibilities and job description for the Cybersecurity Architect position at Hornet Staffing, Inc.?
Job Summary :
The Cybersecurity Architect serves the company as an advisor on best practices and is responsible for designing and effectively implementing project level security strategies, architectures and solutions that guide IT security direction.
They are accountable for the security architecture across a variety of applications or domains and assigned to project / initiatives of small to medium size, complexity and risk.
The Cybersecurity Architect develops actionable security blueprints, principles, models, designs, standards and guidelines to ensure enterprise information technology architecture is consistent, usable, secure and adds value to the business.
The Cybersecurity Architect will design sub-components of larger security architecture blueprints or projects with narrow focus and complexity.
The Cybersecurity Architect performs due-diligence activities including security monitoring to evaluate effectiveness of the enterprise security program and established controls.
The Cybersecurity Architect implements enterprise security strategies, architectures and solutions that guide IT security direction.
Essential Functions :
The essential functions listed represent the major duties of this role, additional duties may be assigned.
Responsible for enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls.
Responsible for establishment, implementation and maintenance of security standards that guide the design of technology solutions.
Accountable for adhering to corporate architecture standards, ensuring technology standards and best practices are maintained across the organization and contributing to corporate architecture strategy-setting.
Responsible for ensuring necessary security controls are part of technical designs.
Participates in governance processes to ensure consistent technology life cycle management
Builds consensus around principles of security architecture and interprets and clarifies these principles.
Participates in IT security efforts across all business areas and client groups.
Participates on project teams contributing input with regard to technology vision, opportunities and challenges.
Participates in the evaluation, selection and implementation of technology solutions including providing detailed analysis of pros and cons and build vs buy options.
Maintains operational, architectural and design documentation including procedures, task lists, and architecture blue prints.
Evaluates strengths and flaws in security architecture including performance, confidentiality, integrity, availability, access and total cost of ownership.
Facilitates project handoffs including preparing documentation, educating and supporting to ensure smooth transitions.
Troubleshoots, recommends and executes action plans for issue resolution.
Selects and designs tools that allow reuse of design components and patterns between projects
Continually works to enhance breadth and depth of knowledge and experience. Benchmarks technology strategies and architectures. Monitors and anticipates trends and investigates organizational objectives and needs. Prepares benchmarking reports and presentations.
Promotes implementation of new technology, solutions and methods to improve business processes, efficiency, effectiveness and value delivered to customers.
Ability to articulate complex solutions which are comprehensive to the target audience (e.g. technical vs. non-technical).
Aptitude to identify, analyze and rationalize risks to ensure decisions made are in the best interest of the business, staff and its customers.
Develops actual working solutions or prototypes based on their own designs and resolves any issues that arise.
Required Work Experience :
4 years related work experience (Progressive work experience in security technology design, architectures, development and / or monitoring )
Required Education :
Related Bachelor's degree or additional related equivalent work experience IT related field or equivalent work experience
Required Licenses and Certifications :
CISSP - Cert Information Systems Security Prof (within 180 Days if converted to FTE)
Additional Preferred Qualifications :
2 or more years of work experience designing security architecture on progressively complex IT projects preferred
2 or more years of cloud security experience
Identity and Access Management experience with employee and consumer identity security
Health care industry related experience is preferred
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Cybersecurity Architect?
Sign up to receive alerts about other jobs on the Cybersecurity Architect career path by checking the boxes next to the positions that interest you.