What are the responsibilities and job description for the Information Security Architect position at Jobs via Dice?
Dice is the leading career destination for tech experts at every stage of their careers. Our client, Cynet Systems, is seeking the following. Apply via Dice today!
We are looking for Information Security Architect for our client in San Antonio, TX
Job Title: Information Security Architect
Job Location: San Antonio, TX
Job Type: Contract
Job Overview:
We are looking for Information Security Architect for our client in San Antonio, TX
Job Title: Information Security Architect
Job Location: San Antonio, TX
Job Type: Contract
Job Overview:
- Executes architecture practices and processes by properly creating and maintaining architecture domain documentation, ensuring timely completion of deliverables, and suggesting enhancements.
- Experience in technology application development and/or infrastructure and operational implementation.
- Deep knowledge in a minimum of one technology domain (from an application, infrastructure, operations, scalability, availability, performance, people, process, and tooling perspective).
- Demonstrated experience in explaining complex technology decisions to both technical and nontechnical audiences at all levels in the organization.
- Demonstrated experience in effectively communicating and developing high-trust relationships with frontline and second-level management and stakeholders.
- Understanding and application of technical architecture standards, principles, and policies, and knowledge of applicable regulations and risk management practices.
- Architectural Oversight: Design and review high-level security architectures for large-scale projects, ensuring alignment with industry standards (e.g., NIST 800-53, NIST CSF).
- Stakeholder Collaboration: Engage with business leaders to ensure security priorities are aligned with organizational goals.
- Risk Management: Participate in risk assessments and establish a risk management framework to mitigate security threats.
- Vendor and Partner Management: Collaborate with third-party service providers and solution tool providers to ensure security compliance and proper integration of security tools.
- Compliance & Audit Readiness: Ensure all systems meet regulatory compliance requirements and are prepared for internal and external audits.
- ZTA.
- SailPoint.
- SCIM.
- Identity Federation.
- CyberArk.
- PAM (Privileged Access).
- Secrets Management.
- API Security.
- Workload Identity.
- ABAC.
- OPA.
- PBAC.
- OAuth.
- ServiceNow GRC.
- SAST.
- DAST.
- ASPM.
- DSPM.
- Native Mobile Application Security.