cybersecurity architect
is a senior-level position responsible for planning, designing, testing, and
maintaining an organization’s computer and network security infrastructure.
The role requires thorough knowledge of the employer’s business and a
comprehensive understanding of the technology it uses to conduct operations. typically
have a good understanding of both technical and business skills. They should
lead the design process, manage existing networks and monitor the traffic.
The professionals also work in coordination with the software and hardware
teams to get the necessary network equipment in place. The Security Architect
will work in collaboration with the network/Security Solution Architects.
You should come from a
similar role where a hands-on experience Is needed dealing with RFP/RFQ and
other related things.
Dealing with Vendors,
Distis and the customer team to make sure a smooth interaction, ability to
present the solutions in a right way, having an exposure to the Market and
following the new trends from Network security and cybersecurity
point-of-view.
7-10 Yrs. (Senior)
· Strong working knowledge
of IT risks, cyber security, and computer operating software
· Advanced understanding
of security protocols, cryptography, and security
· Outstanding
communication skills; strong critical thinking and analytical skills
· Strong leadership,
project and team-building skills, including the ability to lead teams and
drive initiatives in multiple departments
· Demonstrated ability to
identify risks associated with business processes, operations, technology
projects and information security programs
· Ability to function as
an enterprise security subject matter expert who can explain complex topics
to those without a technical background
· Utilizing emerging
technologies to design and implement security solutions; monitoring and
improving those solutions while working with an information security team
· Consulting and
engineering in the design and development of security best practices;
implementation of security measures to meet business goals, customer needs
and regulatory requirements
· Security considerations
of cloud computing, including data breaches, hacking, account hijacking,
malicious insiders, third parties, authentication, APTs, data loss and DoS
attacks
·Identity
and access management; tracking and creating/enforcing policies that govern
access sensitive technology resources and information assets
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.