Cynet Systems · 6 days ago
Senior IT Security Architect
Cynet Systems is a company focused on IT security solutions, and they are seeking a Senior IT Security Architect. The role involves identifying critical business functions, performing security reviews, and evaluating security architectures to ensure adequate protection for information systems and networks.
EmploymentRecruitingStaffing Agency
Responsibilities
Identify and prioritize critical business functions in collaboration with organizational stakeholders
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Qualification
Required
Identify and prioritize critical business functions in collaboration with organizational stakeholders
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
Ability to map system configuration details to Security Policy Controls