Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Security Architect
- 41154BR
- Role description:
- Work closely with the Offering Management and Technology teams to identify and define new security features that align with and support the company’s overall business drivers and strategic direction.
- Ability to communicate importance of security requirements and help the organization understand the need to balance security features with other customer features.
- Ability to design security features in a way that does not interrupt the work flow of end users and can scale to large deployments.
- Ability to develop threat models against architectures to drive requirements for preventing successful attacks of fielded product.
- Define the conceptual architecture and do trade off analysis between the available architecture and design options using rapid prototyping approaches.
- Decompose large projects into manageable features to enable incremental delivery of customer value in an Agile environment.
- Lead the process of scoping the work required for new features with an understanding of the capabilities of various teams.
- Create and refine effort estimates as new information emerges to support the feature commitment process.
- Ensure architectural consistency across the system as new features are added to the product as well as anticipating the impacts of future features.
- Actively work with developers and testers as the “hands on” Feature Architect on Feature Teams to ensure proper implementation and retirement of all requirements. This implies good coding, architecture and testing skills and the ability to apply them as a member of a team working across multiple functional areas and the ability to learn new areas of the product.
- Investigate and resolve system level issues affecting functionality or performance.
- Identify and develop mitigation plans for key technical risks that threaten program success.
- Lead system level Root Cause Analysis (RCA) efforts leading to process improvements that eliminate classes of defects in the future.
- As needed, engage with Customer Support (L2/L3) and customers to resolve critical field issues as they arise leading to improved resolution time, as well as future product and process improvements.
- Required Skills:
- Working understanding of Encryption, Authentication, and Key Management standards, including how they are implemented at the System, Application and OS level.
- Working knowledge of Cloud Security Standards, Security Protocols and Intrusion Prevention techniques
- Working knowledge of Identity Management protocols such as OAuth and SAML
- 5 years writing clear and verifiable requirements
- Root Cause Analysis
- Debugging / solving technical problems in a local familiar and unfamiliar area
- Knowledge of and application of data structures and algorithms to solve engineering problems
- Tech authority: familiar with code, understands weak spots, understands underlying libraries, understands requirements and goals and inputs/outputs/interfaces of the package, authority/consultant/developer for features that affect this package.
- Ability to learn and develop competency in unfamiliar languages or tools
- Knowledge of distributed computing and networking principles
- Able to integrate seemingly disparate things into a coherent picture
- Proactive in becoming familiar with industry trends
- Required Technical and Professional Expertise:
- Working understanding of Encryption, Authentication, and Key Management standards, including how they are implemented at the System, Application and OS level.
- Working knowledge of Cloud Security Standards, Security Protocols and Intrusion Prevention techniques
- Working knowledge of Identity Management protocols such as OAuth and SAML
- 5 years writing clear and verifiable requirements
- Root Cause Analysis
- Preferred Technical and Professional Experience:
- None
- Preferred Education:
- Bachelor's Degree
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement