What are the responsibilities and job description for the Cloud Security Architect Only W2 position at ProCorp Systems Inc.?
Job Details
Location: Charlotte, NC or Atlanta, GA
Job Overview:
The candidate must be a highly experienced subject matter expert with either deep specialization or comprehensive knowledge within a discipline which crosses multiple areas of specialization relative to Cloud architectures and scrutiy principles, Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management. We need someone with deep knowledge/experience with securing complex AWS and Azure architectures.
- Understanding of Security foundations and Standards such as hardening, least privilege, attack surface reduction, NIST SP800-series, NIST Cybersecurity Framework, FIPS 140-2, Common Criteria, FFIEC, FISMA/FedRAMP, ISO 27000, PCI-DSS, CIS Benchmarks, and similar.
- Applies in-depth and specialized expertise and/or a significant breadth of expertise in own professional discipline and other related disciplines.
- Interprets internal/external business challenges and recommends best practices to improve products, processes, or services.
- Mentors less experienced teammates to build their own technical expertise. Impacts the achievement of client, operational, project, service, and risk management objectives.
- Works independently, with guidance in only the most complex and unusual situations.
- Experience with Agile Scrum (Daily Standup, Sprint Planning and Sprint Retrospective meetings)
Specific solution expertise is desired in the following areas:
- Digital Commerce, Digital Banking and Financial Systems architecture
- Large data management architecture and integrations
- Attack protection and mitigation technologies DDoS, WAF, Bot, etc.
- AWS / Azure Cloud - application migration, fit for purpose, etc.
- Multifactor authentication, Risk Based Authentication
- Application authentication models
- Application Security OWASP control and evaluation criteria
- Cryptographic technology Transit encryption, storage encryption, Hash, KMS, Digital Signature, etc.
- Federated Identity Management / Identity Providers / Single Sign On (SSO)
- Client authentication approaches for anti-bot technologies, signaling, and fraud prevention