An advanced skillset position, the security architect reports to the Head of Infrastructure & Operations. The security architect is responsible for designing security solutions that protect the business, but also allow the business to execute and innovate. The security architect works closely with many diverse and dynamic teams, including, but not limited to, IT infrastructure, application delivery, security operations, corporate audit, and end users. This position is also responsible for architecting solutions to secure business-to-business initiatives, third-party relationships, outsourced solutions, and vendors.
The security architect provides expert guidance for addressing current security issues but has the foresight to see where the industry is headed and proactively deliver optimal secure solutions. The architect is expected to think like an adversary and identify how solutions should evolve as the threat landscape changes. A senior-level role, the architect possesses strong communication and organizational skills, and the ability to guide less experienced coworkers. The architect provides technical leadership to delivery and solution design team members.
Position & Responsibilities
- Remain current with new security threats and assess systems to ensure they can defend the business.
- Constantly research capabilities of current and new disruptive solutions on the market and make recommendations to security leadership.
- Research, validate and deploy solutions meeting security and business needs.
- Formally develop security team standards, policies, procedures, and processes.
- Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
- Possess a DevOps focus across technology and security architecture, automation, integration, and distribution.
- Drive security efficiencies, enabling security team members to work on more advanced tasks.
- Partner, coach and functionally lead IT, engineering, development, and business teams.
- Perform engineering performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted.
- Perform other duties as assigned.
- At least 5 to 8+ years’ experience in cybersecurity, including compliance and risk management with a background in system and network security engineering.
- A proven deep background (preferred 5+ years in addition to cybersecurity) in technology design, implementation, and delivery.
- Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private and hybrid environments.
- Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus, and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
- Excellence in communicating business risk from cybersecurity issues.
- Experience driving measurable improvement in monitoring and response capabilities at scale.
- Experience architecting SIEM systems, threat intelligence platforms, security automation and orchestration solutions, IDS/IPS, file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
- Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
- Experience with Microsoft Azure.
- Experience with one or more of the following: ISO 27001, NIST, Payment Card Industry Data Security Standard (PCI DSS), Health Information Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health (HITECH) Act, Sarbanes-Oxley Act (SOX) the General Data Protection Regulation (GDPR), Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2.
- Working knowledge of Windows and Linux.
- Familiarity with state privacy laws.
- Ability to think strategically and tactically, with effective decision-making skills.
- Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively.
- Highly trustworthy; leads by example.
Global Indemnity Group celebrates and supports differences. We are committed to creating a diverse and inclusive environment for our employees, customers and communities we serve. Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, gender, sexual orientation, gender identity, protected veteran status or disability.