TechEra IT Consulting · 9 hours ago
Cybersecurity Architect
Maximize your interview chances
Insider Connection @TechEra IT Consulting
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Perform architecture design and engineering for the Security Environment, including log monitoring, threat intelligence, anti-virus, encryption and web intrusion prevention, Software and tools used to monitor, scan, test and repair the security of the infrastructure
Perform lifecycle engineering of security infrastructure, equipment and software, that are part of, installed on, or used in connection with, the application applicable Security Infrastructure and the processes, tools, infrastructure and other resources necessary and as otherwise required by the Agreement to provide the Security Services
Architect, design and engineer a complete security (e.g., cyber security, information security, user security) program that keeps pace with industry best practices and threat levels, including implementation and maintenance of security and threat management and detection tools and processes across the Company IT Environment
Provide identity and access management (IAM) program design and engineering services
Architect and design capacity planning/analysis as required to meet Company’s requirements, including the Service Levels.
Develop, document, and maintain security policies, to maintain integrity of the Security Services
Architect and engineer Security Services (including Equipment and Software), including anti-virus and anti-malware Software and definitions/signatures, patches, host-based agents, data leak prevention (DLP), web filtering, spam prevention, host-based firewalls, web application firewalls, cloud security products and other monitoring Software, based upon supplier version release keeping the Company IT Environment updated at N release level at all times, subject to Company-approved waivers.
Develop controls for security assessments, audits, and internal control testing.
Develop information classification parameters within CMDB in accordance with Company security strategies, polices, standards and guidelines.
Develop action plan and escalation procedures for any identified potential or real security breaches and reporting of any identified potential or real security breaches
Design all Security Infrastructure and cloud security products
Design the processes used to manage the introduction of new Security Infrastructure into the Company IT Environment.
Provide key leadership and guidance to Company in the development and implementation of security policies as related to the Services. Providing consultative security expertise to Company by making and recommending key decisions in security.
Design integration of email filtering solution with Company LDAP/Active Directory for user authentication
Provide planning, propose service levels, and draft policy statements
Develop standards to maintain compliance within the scope of the Services, which support Company’s information security policies;
Establish Supplier ISMS standards to managing security risks and improving information security to deliver results in accordance with Company’s security requirements and in accordance with Incident Management, Problem Management, Configuration Management, escalation management and Change Management processes
Develop a process by which Company may at any time, subject to an agreed upon notification process, perform quality assurance tests (e.g., penetration tests, generating distributed denial of service (DDoS) activities, generating security alarms) of the security processes and security incident response functions by generating security events and monitoring Supplier’s response to determine if the appropriate action is taken at each step of the process
Maintain all security documentation related to Company’s enterprise security architecture for Equipment, Software and networks
Support Company’s compliance teams with the identification of solutions to meet Company’s compliance requirements
Develop reporting for audit, compliance and board level meetings as directed by Company’s IT leadership
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Hands on experience in Design & Architecture of Cybersecurity (Network Firewall, EDR/DLP, Proxy, PT, Email security) and IAM/PAM/EPM.
Perform architecture design and engineering for the Security Environment, including log monitoring, threat intelligence, anti-virus, encryption and web intrusion prevention, Software and tools used to monitor, scan, test and repair the security of the infrastructure.
Perform lifecycle engineering of security infrastructure, equipment and software, that are part of, installed on, or used in connection with, the application applicable Security Infrastructure and the processes, tools, infrastructure and other resources necessary and as otherwise required by the Agreement to provide the Security Services.
Architect, design and engineer a complete security (e.g., cyber security, information security, user security) program that keeps pace with industry best practices and threat levels, including implementation and maintenance of security and threat management and detection tools and processes across the Company IT Environment.
Provide identity and access management (IAM) program design and engineering services.
Architect and design capacity planning/analysis as required to meet Company’s requirements, including the Service Levels.
Develop, document, and maintain security policies, to maintain integrity of the Security Services.
Architect and engineer Security Services (including Equipment and Software), including anti-virus and anti-malware Software and definitions/signatures, patches, host-based agents, data leak prevention (DLP), web filtering, spam prevention, host-based firewalls, web application firewalls, cloud security products and other monitoring Software, based upon supplier version release keeping the Company IT Environment updated at N release level at all times, subject to Company-approved waivers.
Develop controls for security assessments, audits, and internal control testing.
Develop information classification parameters within CMDB in accordance with Company security strategies, polices, standards and guidelines.
Develop action plan and escalation procedures for any identified potential or real security breaches and reporting of any identified potential or real security breaches.
Design all Security Infrastructure and cloud security products.
Design the processes used to manage the introduction of new Security Infrastructure into the Company IT Environment.
Provide key leadership and guidance to Company in the development and implementation of security policies as related to the Services. Providing consultative security expertise to Company by making and recommending key decisions in security.
Design integration of email filtering solution with Company LDAP/Active Directory for user authentication.
Provide planning, propose service levels, and draft policy statements.
Develop standards to maintain compliance within the scope of the Services, which support Company’s information security policies.
Establish Supplier ISMS standards to managing security risks and improving information security to deliver results in accordance with Company’s security requirements and in accordance with Incident Management, Problem Management, Configuration Management, escalation management and Change Management processes.
Develop a process by which Company may at any time, subject to an agreed upon notification process, perform quality assurance tests (e.g., penetration tests, generating distributed denial of service (DDoS) activities, generating security alarms) of the security processes and security incident response functions by generating security events and monitoring Supplier’s response to determine if the appropriate action is taken at each step of the process.
Maintain all security documentation related to Company’s enterprise security architecture for Equipment, Software and networks.
Support Company’s compliance teams with the identification of solutions to meet Company’s compliance requirements.
Develop reporting for audit, compliance and board level meetings as directed by Company’s IT leadership.
Company
TechEra IT Consulting
TechEra IT Consulting is an IT company that provides hiring solutions, tech support services, advisory, and IT infrastructure.
H1B Sponsorship
TechEra IT Consulting has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (2)
2020 (6)
Funding
Current Stage
Growth StageCompany data provided by crunchbase