What are the responsibilities and job description for the Cybersecurity Architect & Design Engineer position at Tekfortune Inc?
Tekfortune is a fast-growing consulting firm specialized in permanent, contract & project-based staffing services for world's leading organizations in a broad range of industries. In this quickly changing economic landscape, virtual recruiting and remote work are critical for the future of work. To support the active project demands and skills gaps, our staffing experts can help you find the best job for you.
Role : Cybersecurity Architect & Design Engineer
Location : Remote
Duration : 6 Months
Required Skills : Cybersecurity, Firewall, IAM / PAM / EPM
Job Description : Cyber Security Architect - Roles and Responsibilities
- Perform architecture design and engineering for the Security Environment, including log monitoring, threat intelligence, anti-virus, encryption and web intrusion prevention, Software and tools used to monitor, scan, test and repair the security of the infrastructure
- Perform lifecycle engineering of security infrastructure, equipment and software, that are part of, installed on, or used in connection with, the application applicable Security Infrastructure and the processes, tools, infrastructure and other resources necessary and as otherwise required by the Agreement to provide the Security Services
- Architect, design and engineer a complete security (e.g., cyber security, information security, user security) program that keeps pace with industry best practices and threat levels, including implementation and maintenance of security and threat management and detection tools and processes across the Company IT Environment
- Provide identity and access management (IAM) program design and engineering services
- Architect and design capacity planning / analysis as required to meet Company's requirements, including the Service Levels.
- Develop, document, and maintain security policies, to maintain integrity of the Security Services
- Architect and engineer Security Services (including Equipment and Software), including anti-virus and anti-malware Software and definitions / signatures, patches, host-based agents, data leak prevention (DLP), web filtering, spam prevention, host-based firewalls, web application firewalls, cloud security products and other monitoring Software, based upon supplier version release keeping the Company IT Environment updated at N release level at all times, subject to Company-approved waivers.
- Develop controls for security assessments, audits, and internal control testing.
- Develop information classification parameters within CMDB in accordance with Company security strategies, polices, standards and guidelines.
- Develop action plan and escalation procedures for any identified potential or real security breaches and reporting of any identified potential or real security breaches
- Design all Security Infrastructure and cloud security products
- Design the processes used to manage the introduction of new Security Infrastructure into the Company IT Environment.
- Provide key leadership and guidance to Company in the development and implementation of security policies as related to the Services. Providing consultative security expertise to Company by making and recommending key decisions in security.
- Design integration of email filtering solution with Company LDAP / Active Directory for user authentication
- Provide planning, propose service levels, and draft policy statements
- Develop standards to maintain compliance within the scope of the Services, which support Company's information security policies;
- Establish Supplier ISMS standards to managing security risks and improving information security to deliver results in accordance with Company's security requirements and in accordance with Incident Management, Problem Management, Configuration Management, escalation management and Change Management processes
- Develop a process by which Company may at any time, subject to an agreed upon notification process, perform quality assurance tests (e.g., penetration tests, generating distributed denial of service (DDoS) activities, generating security alarms) of the security processes and security incident response functions by generating security events and monitoring Supplier's response to determine if the appropriate action is taken at each step of the process
- Maintain all security documentation related to Company's enterprise security architecture for Equipment, Software and networks
- Support Company's compliance teams with the identification of solutions to meet Company's compliance requirements
- Develop reporting for audit, compliance and board level meetings as directed by Company's IT leadership
For more information and other jobs available please contact our recruitment team at careers@tekfortune.com. To view all the jobs available in the USA and Asia please visit our website at