Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Cybersecurity Consultant Jobs
Recruited by Rapport IT Services Inc 8 months ago Address Plano, TX, United States
Enterprise Systems Architect Jobs
Recruited by City of Tempe Arizona 8 months ago Address , City Of Tempe $95,502 - $127,973 a year
Enterprise Architect Jobs
Recruited by Atos 8 months ago Address , Memphis
Researcher, Demographics Jobs
Recruited by University of Washington 8 months ago Address , Seattle, 98195 $6,800 - $7,963 a month
Enterprise Architect - Hybrid (Atlanta, Ga)
Recruited by OneDigital 8 months ago Address , Atlanta, 30339
Cybersecurity Architect Jobs
Recruited by FRESENIUS 8 months ago Address , Lexington, 02421
Associate Researcher Jobs
Recruited by Spanios 8 months ago Address Houston, TX, United States
Enterprise Architect Jobs
Recruited by Smart IMS 8 months ago Address , Austin
Enterprise Architect Jobs
Recruited by Liberty 8 months ago Address , Downey, 90241
Researcher Jobs
Recruited by St. Jude Children's Research Hospital 8 months ago Address , Memphis, 38105
Enterprise Architect, Program Jobs
Recruited by Siemens 8 months ago Address , Plano $136,700 - $246,100 a year
Enterprise Architect Jobs
Recruited by Costco Wholesale 8 months ago Address , Seattle, 98134 $143,000 - $175,000 a year
Design Researcher Jobs
Recruited by Techtronic Industries Power Equipment 8 months ago Address , Anderson
Enterprise Architect, Program Jobs
Recruited by Siemens 9 months ago Address , Atlanta $136,700 - $246,100 a year
Enterprise Architect Jobs
Recruited by Elan Partners 9 months ago Address Fort Worth, TX, United States
Enterprise Architect - Industry 4.0
Recruited by Koch Industries 9 months ago Address , Atlanta, 30301, Ga
Cybersecurity Risk Operations Developer
Recruited by Toyota North America 9 months ago Address Plano, TX, United States
Cybersecurity Advisor Jobs
Recruited by Dell Technologies 10 months ago Address Austin, TX, United States
Intern, Cybersecurity Jobs
Recruited by Carrier 11 months ago Address , Atlanta, 30339, Ga
Enterprise Architect New! Jobs
Recruited by Dutech Systems 11 months ago Address , Austin, Tx
Researcher Jobs
Recruited by Renascent Solutions 11 months ago Address , Seattle, Wa
Gdm Solution Architect (Gpmo)
Recruited by Honeywell 11 months ago Address , Houston, 77042, Tx
Payments Solution Architect Jobs
Recruited by GM Financial 11 months ago Address , Irving, 75039, Tx $112,200 - $213,100 a year
Cybersecurity Assistant Jobs
Recruited by Interstate Batteries 11 months ago Address , Dallas, Tx
Senior Grc Analyst Jobs
Recruited by REI 11 months ago Address , Seattle, Wa $96,400 - $154,300 a year
Solution Architect Jobs
Recruited by Conduent 11 months ago Address , Atlanta, 30303, Ga $119,350 - $155,000 a year
Researcher - Csp Collectors
Recruited by National Renewable Energy Laboratory 11 months ago Address , Golden, 80401, Co $77,600 - $139,700 a year
Principal-Cybersecurity Jobs
Recruited by AT&T Cybersecurity 11 months ago Address Dallas, TX, United States

Cybersecurity Architect Jobs

Company

FRESENIUS

Address , Lexington, 02421, Ma
Employment type
Salary
Expires 2023-10-03
Posted at 9 months ago
Job Description
POSITION FEATURES:


THIS IS A REMOTE POSITON

  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and security policies, industry regulations, and best practices.
  • Creativity in addressing technical challenges.
  • CISA, CISSP, CRISC, or other relevant certification(s) desired.
  • Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance within those guidelines.
  • Strong client services orientation and communication skills coupled with a high sense of urgency to keep appropriate partners informed, including solutions to overcome obstacles to deliver to expectation.
  • Ability to operate as a pro-active and result-driven problem solver with excellent analytical and interpersonal skills.
  • Ability to understand IT processes, management objectives risk appetite and tolerances and impact of objectives, of changes to risk profiles.
  • Participate in the design and implementation of a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.
  • Assess and understand the organization’s current security posture and future architecture requirements, providing recommendations for improvement and risk reduction.
  • 6-10 years of experience working with internal/external audits or risk management - methods and techniques for the assessment and management of risk.
  • Bachelor's degree in management information systems, Computer Science, or business/science related field required.
  • Familiarity with OWASP, SANS Top 20 and prevention/remediation techniques and their implementation.
  • Contribute the creation of security policies, access controls, and authentication mechanisms based on Zero Trust principles.
  • None
  • The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
  • Ability to work in a group development environment as an application security engineer across software engineer, QA engineer and build/test/release engineer teams.
  • Experience in deploy/maintain/support/analyzing DAST/SAST scan result
  • Experience in IT governance, risk, and controls, including governance frameworks.
  • Proven record to deliver results.
  • Ability to work effectively in a team environment.

  • PURPOSE AND SCOPE:

    The Cybersecurity Architect is responsible for the integration and development of standards, processes, tools, technologies, and security service offerings. This individual will leverage leading-edge technologies, and innovative approaches to position Fresenius Medical Care for measurable success, improving efficiency, increasing security posture, supporting aggressive growth, and improving the organization’s overall cybersecurity posture.

    The right candidate must have excellent engagement and communication skills and must have a strong customer-focused, team-oriented, approach that balances security needs and user experience to provide best-in-class security to the organization with subject matter expertise in enterprise security architecture governance and industry standard cyber security frameworks, cloud computing, and cloud architecture.


    PRINCIPAL DUTIES AND RESPONSIBILITIES:

    • Work closely with engineering, operations, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.

    • Assess and understand the organization’s current security posture and future architecture requirements, providing recommendations for improvement and risk reduction.

    • Ensures implemented solutions support cybersecurity architecture objectives (availability, scalability, performance, security, etc.), as appropriate, and monitors implementation activities to ensure architecture and design principles are upheld.

    • Supports the implementation of technical artifacts (frameworks, standards, and repeatable patterns, etc.) that constitute the enterprise information security architecture and solutions and work with infrastructure teams to ensure adoption.

    • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and security policies, industry regulations, and best practices.

    • Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance within those guidelines.

    • Participate in the design and implementation of a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.

    • Contribute the creation of security policies, access controls, and authentication mechanisms based on Zero Trust principles.

    • Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.

    • Familiarity with OWASP, SANS Top 20 and prevention/remediation techniques and their implementation.

    • Ability to work in a group development environment as an application security engineer across software engineer, QA engineer and build/test/release engineer teams.

    • Experience in deploy/maintain/support/analyzing DAST/SAST scan result


    PHYSICAL DEMANDS AND WORKING CONDITIONS:

    • The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.


    SUPERVISION:

    • None


    EDUCATION:

    • Bachelor's degree in management information systems, Computer Science, or business/science related field required.


    EXPERIENCE AND REQUIRED SKILLS:

    • 6-10 years of experience working with internal/external audits or risk management - methods and techniques for the assessment and management of risk.

    • Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered.

    • Strong understanding of network architecture, protocols, and security technologies.

    • Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.

    • Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.

    • Ability to operate as a pro-active and result-driven problem solver with excellent analytical and interpersonal skills.

    • Ability to understand IT processes, management objectives risk appetite and tolerances and impact of objectives, of changes to risk profiles.

    • CISA, CISSP, CRISC, or other relevant certification(s) desired.

    • Strong client services orientation and communication skills coupled with a high sense of urgency to keep appropriate partners informed, including solutions to overcome obstacles to deliver to expectation.

    • Experience in IT governance, risk, and controls, including governance frameworks.

    • Demonstrated technical writing, communication, and presentation skills.

    • Ability to work effectively in a team environment.

    • Creativity in addressing technical challenges.

    • Proven record to deliver results.

  • Demonstrated technical writing, communication, and presentation skills.
  • Supports the implementation of technical artifacts (frameworks, standards, and repeatable patterns, etc.) that constitute the enterprise information security architecture and solutions and work with infrastructure teams to ensure adoption.
  • Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.
  • Strong understanding of network architecture, protocols, and security technologies.
  • Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.
  • Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.
  • Work closely with engineering, operations, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
  • Ensures implemented solutions support cybersecurity architecture objectives (availability, scalability, performance, security, etc.), as appropriate, and monitors implementation activities to ensure architecture and design principles are upheld.
  • Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered.