Ensure that minimum standards for security are established and maintained, and appropriate guidance is provided to support the business, IT operations and delivery.
Maintain blueprints for secure design and configuration of common IT architectures and ensure that the consumption of security controls/services is repeatable and efficient.
Ensure security requirements for projects being delivered throughout the business are standardized, with appropriate due diligence/governance processes being implemented throughout the delivery life cycle.
Ensure security risk mitigation objectives are Embedded by design’ into the development of existing and/or new applications that support product/service lines.
Ensure a consistent and efficient delivery mechanism is in place for the effective implementation of security controls.
Ensure that appropriate service transition requirements are considered and Embedded within projects prior to any new controls/services being operationalized.
Maintain understanding of current and leading-edge information security technologies and how these may be applicable, where applicable translate research into business outcomes.
Design, deliver and maintain the end-to-end target security architecture.
Delivering the security design patterns, with full audit trail.
Developing and maintaining the security architecture control framework.
Skills & Experience:
Comprehensive technical knowledge and practical experience [minimum of 5 years] in Information security/Security architecture in either large-scale enterprise or telecommunications industry.
Experience in enterprise architecture frameworks.
Experience in thread modelling/deign patterns.
Proven Experience in designing and applying security controls into distributed systems (on prem and cloud).
Thorough understanding of the latest security principles, techniques, and protocols.
Demonstrable experience in embedding security into the change life cycle.
Understanding of software-defined network and network function virtualization concepts and technologies.
Familiarity with OWASP Top 10, SANS Top 25, NIST, CIS etc.
Applied understanding of topics such as authentication, access control, encryption, cloud security, operating system security, network security, database security.
Good understanding of practices and methods of IT strategy, enterprise architecture and security architecture Deep understanding of common as well as emerging vulnerabilities and how they manifest in different types of applications (web applications, thick clients, APIs, etc.).
Qualifications:
CISSP or an equivalent security qualification.
Bachelor’s degree or direct and applicable work experience.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.