Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Cybersecurity Consultant Jobs
Recruited by Rapport IT Services Inc 8 months ago Address Plano, TX, United States
Enterprise Systems Architect Jobs
Recruited by City of Tempe Arizona 8 months ago Address , City Of Tempe $95,502 - $127,973 a year
Enterprise Architect Jobs
Recruited by Atos 8 months ago Address , Memphis
Researcher, Demographics Jobs
Recruited by University of Washington 8 months ago Address , Seattle, 98195 $6,800 - $7,963 a month
Enterprise Architect - Hybrid (Atlanta, Ga)
Recruited by OneDigital 8 months ago Address , Atlanta, 30339
Associate Researcher Jobs
Recruited by Spanios 8 months ago Address Houston, TX, United States
Enterprise Architect Jobs
Recruited by Smart IMS 8 months ago Address , Austin
Enterprise Architect Jobs
Recruited by Liberty 8 months ago Address , Downey, 90241
Researcher Jobs
Recruited by St. Jude Children's Research Hospital 8 months ago Address , Memphis, 38105
Enterprise Architect, Program Jobs
Recruited by Siemens 8 months ago Address , Plano $136,700 - $246,100 a year
Enterprise Architect Jobs
Recruited by Costco Wholesale 8 months ago Address , Seattle, 98134 $143,000 - $175,000 a year
Design Researcher Jobs
Recruited by Techtronic Industries Power Equipment 8 months ago Address , Anderson
Enterprise Architect, Program Jobs
Recruited by Siemens 9 months ago Address , Atlanta $136,700 - $246,100 a year
Enterprise Architect Jobs
Recruited by Elan Partners 9 months ago Address Fort Worth, TX, United States
Enterprise Architect - Industry 4.0
Recruited by Koch Industries 9 months ago Address , Atlanta, 30301, Ga
Cybersecurity Architect Jobs
Recruited by FRESENIUS 9 months ago Address , Lexington, 02421, Ma
Cybersecurity Advisor Jobs
Recruited by Dell Technologies 10 months ago Address Austin, TX, United States
Intern, Cybersecurity Jobs
Recruited by Carrier 11 months ago Address , Atlanta, 30339, Ga
Enterprise Architect New! Jobs
Recruited by Dutech Systems 11 months ago Address , Austin, Tx
Researcher Jobs
Recruited by Renascent Solutions 11 months ago Address , Seattle, Wa
Gdm Solution Architect (Gpmo)
Recruited by Honeywell 11 months ago Address , Houston, 77042, Tx
Payments Solution Architect Jobs
Recruited by GM Financial 11 months ago Address , Irving, 75039, Tx $112,200 - $213,100 a year
Cybersecurity Assistant Jobs
Recruited by Interstate Batteries 11 months ago Address , Dallas, Tx
Senior Grc Analyst Jobs
Recruited by REI 11 months ago Address , Seattle, Wa $96,400 - $154,300 a year
Solution Architect Jobs
Recruited by Conduent 11 months ago Address , Atlanta, 30303, Ga $119,350 - $155,000 a year
Researcher - Csp Collectors
Recruited by National Renewable Energy Laboratory 11 months ago Address , Golden, 80401, Co $77,600 - $139,700 a year
Principal-Cybersecurity Jobs
Recruited by AT&T Cybersecurity 11 months ago Address Dallas, TX, United States
Solution Architect Jobs
Recruited by Photon 11 months ago Address , , Tx
Cybersecurity Researcher - Junior
Recruited by Maximus 11 months ago Address , Mclean, 22102, Va From $90,000 a year
Nurse Researcher/Com Jobs
Recruited by University of Kentucky 1 year ago Address , Lexington, 40508, Ky $24.51 - $40.44 an hour

Cybersecurity Architect Jobs

Company

FRESENIUS

Address , Lexington, 02421
Employment type
Salary
Expires 2023-10-18
Posted at 8 months ago
Job Description
POSITION FEATURES:


Remote Position

  • Ability to understand IT processes, management objectives risk appetite and tolerances and impact of objectives, of changes to risk profiles.
  • Contribute the creation of security policies, access controls, and authentication mechanisms based on Zero Trust principles.
  • Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.
  • CISA, CISSP, CRISC, or other relevant certification(s) desired.
  • Demonstrated technical writing, communication, and presentation skills.
  • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and security policies, industry regulations, and best practices.
  • Assess and understand the organization’s current security posture and future architecture requirements, providing recommendations for improvement and risk reduction.
  • Experience in IT governance, risk, and controls, including governance frameworks.
  • Ensures implemented solutions support cybersecurity architecture objectives (availability, scalability, performance, security, etc.), as appropriate, and monitors implementation activities to ensure architecture and design principles are upheld.
  • Ability to operate as a pro-active and result-driven problem solver with excellent analytical and interpersonal skills.
  • Strong understanding of network architecture, protocols, and security technologies.
  • Ability to work effectively in a team environment.
  • 6-10 years of experience working with internal/external audits or risk management - methods and techniques for the assessment and management of risk.
  • Strong client services orientation and communication skills coupled with a high sense of urgency to keep appropriate partners informed, including solutions to overcome obstacles to deliver to expectation.
  • Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered.
  • Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.
  • Experience in deploy/maintain/support/analyzing DAST/SAST scan result
  • Proven record to deliver results.
  • Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.
  • Participate in the design and implementation of a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.
  • Familiarity with OWASP, SANS Top 20 and prevention/remediation techniques and their implementation.
  • Supports the implementation of technical artifacts (frameworks, standards, and repeatable patterns, etc.) that constitute the enterprise information security architecture and solutions and work with infrastructure teams to ensure adoption.
  • Ability to work in a group development environment as an application security engineer across software engineer, QA engineer and build/test/release engineer teams.
  • Bachelor's degree in management information systems, Computer Science, or business/science related field required.
  • Work closely with engineering, operations, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
  • The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • PURPOSE AND SCOPE:

    The Cybersecurity Architect is responsible for the integration and development of standards, processes, tools, technologies, and security service offerings. This individual will leverage leading-edge technologies, and innovative approaches to position Fresenius Medical Care for measurable success, improving efficiency, increasing security posture, supporting aggressive growth, and improving the organization’s overall cybersecurity posture.

    The right candidate must have excellent engagement and communication skills and must have a strong customer-focused, team-oriented, approach that balances security needs and user experience to provide best-in-class security to the organization with subject matter expertise in enterprise security architecture governance and industry standard cyber security frameworks, cloud computing, and cloud architecture.


    PRINCIPAL DUTIES AND RESPONSIBILITIES:

    • Work closely with engineering, operations, and security specialists to ensure adequate security solutions and controls are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.

    • Assess and understand the organization’s current security posture and future architecture requirements, providing recommendations for improvement and risk reduction.

    • Ensures implemented solutions support cybersecurity architecture objectives (availability, scalability, performance, security, etc.), as appropriate, and monitors implementation activities to ensure architecture and design principles are upheld.

    • Supports the implementation of technical artifacts (frameworks, standards, and repeatable patterns, etc.) that constitute the enterprise information security architecture and solutions and work with infrastructure teams to ensure adoption.

    • Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and security policies, industry regulations, and best practices.

    • Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance within those guidelines.

    • Participate in the design and implementation of a comprehensive Zero Trust Architecture framework to ensure the confidentiality, integrity, and availability of our systems and data.

    • Contribute the creation of security policies, access controls, and authentication mechanisms based on Zero Trust principles.

    • Evaluate existing network and security infrastructure, identify vulnerabilities, and recommend enhancements to align with Zero Trust principles.

    • Familiarity with OWASP, SANS Top 20 and prevention/remediation techniques and their implementation.

    • Ability to work in a group development environment as an application security engineer across software engineer, QA engineer and build/test/release engineer teams.

    • Experience in deploy/maintain/support/analyzing DAST/SAST scan result


    PHYSICAL DEMANDS AND WORKING CONDITIONS:

    • The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.


    SUPERVISION:

    • None


    EDUCATION:

    • Bachelor's degree in management information systems, Computer Science, or business/science related field required.


    EXPERIENCE AND REQUIRED SKILLS:

    • 6-10 years of experience working with internal/external audits or risk management - methods and techniques for the assessment and management of risk.

    • Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered.

    • Strong understanding of network architecture, protocols, and security technologies.

    • Familiarity with cloud computing platforms, such as AWS, Azure, or Google Cloud, and their associated security services.

    • Proficiency in security frameworks and standards, such as ISO 27001, NIST, and CIS.

    • Ability to operate as a pro-active and result-driven problem solver with excellent analytical and interpersonal skills.

    • Ability to understand IT processes, management objectives risk appetite and tolerances and impact of objectives, of changes to risk profiles.

    • CISA, CISSP, CRISC, or other relevant certification(s) desired.

    • Strong client services orientation and communication skills coupled with a high sense of urgency to keep appropriate partners informed, including solutions to overcome obstacles to deliver to expectation.

    • Experience in IT governance, risk, and controls, including governance frameworks.

    • Demonstrated technical writing, communication, and presentation skills.

    • Ability to work effectively in a team environment.

    • Creativity in addressing technical challenges.

    • Proven record to deliver results.

  • None
  • Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance within those guidelines.
  • Creativity in addressing technical challenges.