security architect at Remote, Remote, USA |
Email: [email protected] |
From: Syeda Hajra, Absolute IT [email protected] Reply to: [email protected] IAM security architect hybrid at TX and FL contract Hybrid role Business Unit Description Mission Drive efficient and effective security capabilities through innovative thought leadership with a security first mindset which advances DTCCs mission to protect & shape the financial markets. Vision - A strong adaptive cybersecurity environment that continuously secures & protects DTCC and its services to the financial industry. Purpose - Cybersecurity Architecture is a core pillar of Architecture and Enterprise Services within the Information Technology (IT) business unit. The team is responsible for designing architecture solutions for information security functions and publish reusable security patterns. Why Youll Love This Job As an Identity Access Management (IAM) Security Architect for the Cybersecurity Architecture Team, you will focus on existing identity access management controls (on-premise and cloud), design new and efficient security architectures, influence change in control standards, create IT security standards easily consumed by stakeholders, create access specific security patterns & diagrams, and own the Identity & Access Management 3 year roadmap. This role will be an ambassador for the shift in the technology culture at DTCC to a Security-First culture. Position Summary The primary focus areas for this position are the following: Produce security architecture deliverables as part of initiatives related to certificate services and identity and access management Partner with IT teams to design and deliver architectures to enable federated access and single sign on in cloud and hybrid environments Proactively identify security gaps, propose solutions, and follow through with engineering teams for implementation Innovate and lead others to solve complex issues Your Responsibilities Drive the Identity & Access Management and secrets management architecture roadmap and share with AES stakeholders Participate in discovery workshops to understand clients & Workforce IAM and security needs and provide best practice recommendations to meet IAM use cases. Develop design and architectural diagrams that clearly communicate the proposed solution and flows Actively participate in the cross-functional team meeting, developing project plans, implementation, testing, pre / post go-live activities, risk management and issue management. Architect solutions utilizing Ping Identity Products, PlainID and similar IAM products, such as IGA tools, Virtual Directory, PAM and Secret Management solutions. Create IT security standards easily consumed by stakeholders. Evaluate the existing application security controls, (on-premise and cloud), identify improvements, and build plans into the application security capability roadmap for implementation Build access management security patterns (standardizing authentication/authorization flows, single-sign-on/MFA, provisioning, user behavior analytics, access governance system controls, privileged/secrets mgt) and designs as part of initiatives to modernize the DTCC access management security posture Mentor junior security engineers and architects to enhance their cybersecurity and architecture skills Maintain professional and technical process knowledge by keeping abreast of the changing security landscape within the technology industry and changes in cybersecurity frameworks Create white papers and present in industry conferences to display thought leadership in the security field Align risk and control processes into day-to-day responsibilities to monitor and mitigate risk; escalates appropriately Leadership Competencies for this level include Feedback: Seeks feedback from others, provides feedback to others in support of their development, and is open and honest while dealing constructively with criticism. Delegating: Effectively manages tasks and people, taking a practical approach to determine the most effective method of execution while respecting others expertise and considering others feelings and working styles. Inclusive Leadership: Values individuals and embraces diversity by integrating differences and promoting diversity and inclusion across teams and functions. Coaching: Understands and anticipates people's needs, skills, and abilities, in order to coach, motivate and empower them for success. Qualifications 8-10 years of related experience Bachelors degree preferred Specific Skills & Technologies Strong cybersecurity experience in architecting implementations using Ping Identity products (especially PingFed, PingOne, PingID, and PingAuthorize) is required. Experience with most standard IAM security protocols (Eg: OAuth, OIDC, RACF, SAML, LDAP, ID Federation, SSO, MFA, UEBA) is required. Experience architecting solution using products like API Gateway, IGA and Virtual Directory is required. Strong experience in identifying access management control gaps Experience with Information Security frameworks (e.g., ISO 27001, CIS, MITRE ATT&K and NIST) & security architecture frameworks Experience architecting automated data centre processes, including provisioning, application, and patch management, monitoring and alerting, capacity monitoring and planning, leveraging execution and human approval workflow design and implementation Experience in OS security (Windows, Linux), Network security (Firewall, Proxy, WAF) and RDMS is preferred Strong communication skills with the ability to present in front of large audience Keywords: information technology golang Florida Idaho Texas |
[email protected] View All |
10:23 PM 15-Sep-23 |