What are the responsibilities and job description for the IT Security Architect position at Republic Airways?
JR-006222
POSITION PURPOSE:
The IT Security Architect is responsible for leading strategy, vision, and design of the IT Security architecture across the organization. This role develops, designs, implements, and maintains a company-wide information security infrastructure to ensure objectives are achieved for system integrity, availability, confidentiality, accountability, and compliance.
Essential Duties
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
The requirements listed below are representative of the knowledge, skill, and/or ability necessary to perform this job.
EDUCATION And/or EXPERIENCE
Ability to read, analyze, and interpret general business periodicals, professional journals, technical procedures, or governmental regulations. Ability to author reports, business correspondence, and procedure manuals. Ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Be an excellent communicator and collaborator, engaging with multiple technical and business stakeholders and leaders.
REASONING/PROBLEM SOLVING ABILITY
Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
DECISION MAKING
Makes decisions daily on use of resources, performance, and budgets. Decisions could require additional expenditure of resources if not sound decisions.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job.
Able to stand, walk, and reach with hands and arms up to 35% of the time.
Able to sit, use hands and talk or hear over 70% of the time.
Lift up to 50 pounds as often as up to 35% of the time.
Able to focus with clear vision at 20 inches or less (computer screen).
WORK ENVIRONMENT
The work environment characteristics described here are representative of those associate encounters while performing the essential functions of this job.
Encounters risk of electrical shock up to 5% of the time.
Travel Requirements
Travel up to 10% of the time, including overnight.
EQUAL OPPORTUNITY EMPLOYER, DISABILITY, AND VETERAN ACCOMODATIONS
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
POSITION PURPOSE:
The IT Security Architect is responsible for leading strategy, vision, and design of the IT Security architecture across the organization. This role develops, designs, implements, and maintains a company-wide information security infrastructure to ensure objectives are achieved for system integrity, availability, confidentiality, accountability, and compliance.
Essential Duties
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
- Establishes a strategic security architecture vision, including standards and frameworks that are aligned with the overall business objectives and IT strategies (NIST, Zero-trust etc.).
- Oversees enterprise level solution architecture for IT Security. Integration of AD and IAM across the infrastructure.
- Acts as information security subject matter expert; provides advisory and consulting services to business, IT departments, and IT leadership.
- Leads in the development of information security strategies, roadmaps, policies, and standards across external, internal, and cloud-based infrastructure.
- Recommends modifications to application development, database design, networking, or infrastructure architecture with the goal of complying with internal information security policies and standards.
- Monitors emerging products, technologies, or best practices that will improve security for the organization and its stakeholders.
- Assists senior leadership in the development of security policies, standards, and strategies.
- Performs or participates in security audits, identifies security gaps, and develops and implements risk mitigation solutions.
- Leads critical Cyber initiatives including Penetration testing, Security Incident Response Tabletop, and Red/Purple team exercises.
- Performs complex daily administration of information security hardware and software such as intrusion detection/intrusion prevention, firewalls, encryption, anti-virus, log reviews and other software or appliances.
- Identifies, highlights, and provides security recommendations during requirement and design reviews.
- Maintains the security infrastructure by employing best industry practices.
- Oversees testing of computer systems to monitor effectiveness of security systems.
- Analyzes information security threats, requests, and audit findings. Develops solutions to resolve issues and/or findings.
- Partners with end-users to understand and adhere to information security policies and procedures.
- Collaborates with external vendors and partners as necessary to resolve issues/incidents.
- Collaborates with internal customers, including business partners, internal IT, and vendors/contractors to ascertain problem/issue determination and resolution.
- Develops and supports business initiatives when needed.
- Responds to internal service requests, change requests, incidents. Adheres to change management standard operating procedures.
- Ensures adherence to a departmental budget.
- Provides technical leadership and mentoring to team and department members. Leads through example, monitors, influences, and trains others. Provides input to Leadership on performance reviews and helps to identify development needs.
- Participates in a 24/7 on-call rotation, as required.
- Performs other duties as assigned.
The requirements listed below are representative of the knowledge, skill, and/or ability necessary to perform this job.
EDUCATION And/or EXPERIENCE
- Bachelor’s degree (B.A. / B.S.) in Cybersecurity, Computer Science, or related field or the equivalent combination of education and experience.
- 7 years of progressive experience in information security.
- Certified Information Systems Security Professional (CISSP) or similar certification.
- In-depth knowledge of designing and implementing information security solutions.
- Programming language structures and logic.
- 10 years of related Information Security and/or IT networking experience.
- 3 years of practical experience in architecting enterprise level cyber security solutions
- (ISC)² Certified Information Systems Security Professional (CISSP) or similar certification.
- (ISC)² Certified Cloud Security Professional (CCSP) or similar certification.
- EC-Council Certified Ethical Hacker (CEH)
Ability to read, analyze, and interpret general business periodicals, professional journals, technical procedures, or governmental regulations. Ability to author reports, business correspondence, and procedure manuals. Ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Be an excellent communicator and collaborator, engaging with multiple technical and business stakeholders and leaders.
REASONING/PROBLEM SOLVING ABILITY
Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
DECISION MAKING
Makes decisions daily on use of resources, performance, and budgets. Decisions could require additional expenditure of resources if not sound decisions.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job.
Able to stand, walk, and reach with hands and arms up to 35% of the time.
Able to sit, use hands and talk or hear over 70% of the time.
Lift up to 50 pounds as often as up to 35% of the time.
Able to focus with clear vision at 20 inches or less (computer screen).
WORK ENVIRONMENT
The work environment characteristics described here are representative of those associate encounters while performing the essential functions of this job.
Encounters risk of electrical shock up to 5% of the time.
Travel Requirements
Travel up to 10% of the time, including overnight.
EQUAL OPPORTUNITY EMPLOYER, DISABILITY, AND VETERAN ACCOMODATIONS
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.