Information Technology Security Architect @ V Group Inc. | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Information Technology Security Architect jobs in United States
53 applicants
company-logo

V Group Inc. ยท 5 hours ago

Information Technology Security Architect

ftfMaximize your interview chances
ConsultingE-Commerce
check
H1B Sponsor Likelynote
Hiring Manager
Vikas Harchandani
linkedin

Insider Connection @V Group Inc.

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Strong experience with containerization technologies such as Docker and container orchestration tools like Kubernetes (Redhat OpenShift preferred).
Demonstrable experience on securing containerized environments and integrate security into container workflows.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
In addition to these technical skills and experiences possessing relevant certifications such as certified Ethical Hacker (CEH), or AWS Certified Security Specialty in security and DevOps practices.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7, Application of these in a data center environment is highly desired.
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel.
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Expertise in using Copado for Salesforce deployment automation and release management.
Knowledge of common security frameworks such as OWASP Top 10 and CIS Benchmarks.
Experience using GitHub Actions for CI/CD pipelines and GitHub Security features like code scanning and secret scanning.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
Industrial experience w/ DevSecOps concept such as static code analysis, dependency bot, and container hardening. Experience with integration of these.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7. Application of these

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Security principlesContainerization (Docker)KubernetesRegulatory compliance HIPAARegulatory compliance PCI DSSCertified Ethical Hacker (CEH)AWS Certified Security SpecialtyRisk ManagementVulnerability assessment documentationCopado for SalesforceOWASP Top 10GitHub ActionsDevSecOps conceptsOSI networking modelNetwork security design

Required

Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Strong experience with containerization technologies such as Docker and container orchestration tools like Kubernetes (Redhat OpenShift preferred).
Demonstrable experience on securing containerized environments and integrate security into container workflows.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
In addition to these technical skills and experiences possessing relevant certifications such as certified Ethical Hacker (CEH), or AWS Certified Security Specialty in security and DevOps practices.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7, Application of these in a data center environment is highly desired.
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel.
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Expertise in using Copado for Salesforce deployment automation and release management.
Knowledge of common security frameworks such as OWASP Top 10 and CIS Benchmarks.
Experience using GitHub Actions for CI/CD pipelines and GitHub Security features like code scanning and secret scanning.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
Industrial experience w/ DevSecOps concept such as static code analysis, dependency bot, and container hardening. Experience with integration of these.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7.

Preferred

Redhat OpenShift preferred.

Company

V Group Inc.

twittertwittertwitter
company-logo
Since 1999, V Group Inc.

H1B Sponsorship

V Group Inc. has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (1)
2021 (2)
2020 (1)

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Vijay Kumar Palandurkar
CEO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot