Great careers start here

Director Chief Info Security Architect

📁
Engineering/IT/Security/Software Development
📅
190000KR Requisition #
Director, Chief Security Architect                                                             REQ# 190000KR
 

Position Overview: 

The Director, Chief Security Architect is responsible for developing the Entrust Datacard Enterprise Security Architecture.  This individual will provide senior leadership and oversight over our global security infrastructure providing advisory support on products, platforms, help develop technical standards and work on design services (e.g., software assurance infrastructure projects, etc).  You will be responsible for developing and maintaining a customer-focused (both IT and commercial) product team of architects, network security and cloud services engineers.  The Director directly supports product strategy with information security guidance and direction.  This position will work with a variety of internal and external service providers to ensure an effective & appropriate architecture, design, integration, engineering, and overall strategy of all technologies that have an impact on the security of Entrust Datacard.  They must anticipate all of the moves and tactics that hackers will use to try and gain unauthorized access to the computer system. This position will develop a security roadmap for the organization and will research, design, and oversee implementation of information technology, systems, and policies for information security in support of business needs.  The security roadmap will ensure delivery of both the plan across the business; ensuring protection of company data and Information Security compliances are met through building effective working relationships with Key departments across the business. 

Responsibilities:
  • Oversee and ensure the delivery of information security strategy and architecture to a wide variety of senior level.
  • Provides strategic leadership and direction to staff to maximize the security posture of all infrastructure, cloud as well as commercial products.
  • Manages all information security vendor and project management. 
  • Determine enterprise-wide security strategy and security architecture to include commercial product development.
  • Manage team performance as well as influence other teams (e.g., IT, HR, Legal, Engineering, etc).
  • Develop a single IT Security Infrastructure Roadmap that reflects business processes and supports the Entrust Datacard infrastructure as well as the Entrust Datacard Cloud environment.  This roadmap should also reflect equities for our commercial products.
  • The technologies within the scope of this position include the full range of logical and physical security architectures and technologies including but not limited to IPS, firewall, SEIM, VPN, DLP, end point security tools, email, web, data, video, physical access control hardware and related operating systems & supporting software.
  • Working with Cloud team to develop Cloud security requirements.
  • Work with internal team members and outside suppliers to ensure coordination and proper configuration is in place to meet or exceed policy.
  • Ensure the delivery of world-class security monitoring and audit services through the deployment of a cutting-edge global sensor grid
  • Develop strategic vision to managing the daily execution of enterprise defense services to ensure the protection of critical company data via a variety of capabilities to include boundary controls, intrusion detection, host/end point protection, and data loss prevention
  • Supply technical oversight of security operations services to ensure capabilities and technology is being used to its most effective state
  • Collaborate with key stakeholders such as Senior Management, system owners and operators to ensure effective monitoring and protection is implemented for all environments
  • Implement policies and standards to ensure proper and effective controls within technologies to enforce policy and standards.
  • Identifying information security risk within the enterprises and recommending priorities for risk mitigation through the use of additional technologies, capabilities, and services.
  • Work closely with Architecture teams to ensure that non security technologies are properly architected and in accordance with security policy and standards.
  • Work closely with service delivery providers and Cyber Defense Operations Lead to ensure security services are adequate and providing the proper levels of controls. 
  • Work closely with Security Incident Response personnel to ensure that identified threats and incidents are properly remediated and lessons learned drive continuous improvement of technologies and services back into the program. 
  • Work closely with GRC and Policy Lead to ensure policy and standards are appropriately written and up to date, and that exceptions are properly controlled and accounted for.
  • Provide design review and approval on architectures to ensure a system of independent checks and balances are in place.
  • Designs complex application security architecture. Coordinate technical design/review activities with application development, teams, information security, systems, network, and database groups to develop secure frameworks and enterprise applications.
  • Designs the enterprise security infrastructure and architectural topology, including recommending hardware, operating system, software, and information security requirements to ensure the confidentiality, integrity, availability, and privacy of information systems. Ensure consistency and sufficient integration with existing infrastructure.
  • Develops systems and procedures to safeguard internal information systems and databases from unauthorized users. Recommends and implements revisions as appropriate.
  • Researches, recommends and implements changes to procedures and systems to enhance systems security.
  • Educates customers to increase awareness of information security policies and best practices.
  • Assists and/or provides limited direction to lower level technical personnel.
  • Stay abreast of the technical trends and directions of the security climate. Build relationships with the security vendor community to identify new opportunities for use of these technologies internally.

Basic Qualifications
         Bachelor’s degree in Computer Science, a related field or equivalent experience
         Minimum of five (5) years of experience in supporting and maintaining of logical and physical security architectures and technologies including but not limited to IPS, firewall, SEIM, VPN, email, web, data, video, physical access control hardware and related operating systems & supporting software.
         Minimum of ten (10) years of experience in IT program management or IT operations and minimum four (4) years of experience in information security architecture and engineering
         Demonstrated experience performing advanced troubleshooting of security network infrastructure including but not limited to packet analysis, encryption protocols and log correlation using proven forensics methodologies.
         Good understanding of key network and technical security controls such as NIST Special Publication 800-53.
         Experience in providing consulting to senior management on the use and selection of these technologies.
         Technical knowledge of TCP/IP, network security, application security, database security, and endpoint security. 
         Understanding of Cloud security.
         Detailed knowledge and experience with 24x7 Security Operations Centers to include analytical tools, analytical coordination, and team management
         Significant experience with the daily operations of information security controls such as intrusion detection, malware defenses, network access controls, and data loss prevention
         Background with enterprise risk management to include vulnerability assessments, asset management, and continuous monitoring
         Knowledge of security intelligence and cyber threat tracking to include Advanced Persistent Threat (APT) issues
         Detailed knowledge of Security Information and Event Management (SIEM) systems
         Proven people management skills working with internal staff, contractors, and external service suppliers
         Certification in relevant industry standards on security and service management, e.g. ITIL, CobIT, CISM and/or CISSP, CISSP-ISSAP
         Experience managing staff
         Must have unrestricted work authorization for US
         An Active Security Clearance or the ability to obtain one
Preferred Qualifications:
         Technical Vendor management and negotiating skills.
         Certification Authorities:  Industry-specific certifications, including one or more of the following: CISSP, CISA, GIAC
         Excellent communication skills including the ability to present complex presentations to large audiences.
         Strong self-starter who has the ability to operate independently and work well with a team
         Excellent oral and written communication skills including presentations and documentation
         Ability to work independently and as part of a team
         Proven experience in working/managing virtual teams and geographically dispersed stakeholders
         Strong communication skills to interface with and influence senior business stakeholders
         Apply ability to deliver through others, work with minimum supervision and effectively operate in a dynamic global organization.
         Proven communication and presentation skills;
         Knowledge of 1 or more of the following disciplines:
Ø  Scripting language experience
Ø  Malware forensics experience
Ø  Policy and Compliance writing experience
Ø  PEN Testing experience
Ø  Understanding of cloud computing services and architecture
About Entrust Datacard
Our growing company relies on curious, dedicated and innovative colleagues to anticipate the future and provide solutions for a more connected, mobile and secure world. Entrust Datacard technologies and expertise help government agencies, enterprises and financial institutions in more than 150 countries serve and safeguard citizens, employees and consumers. Each year, our solutions secure billions of transactions — and every day, our technologies issue and manage more than 10 million secure identities. How do we do all of this? Together.  Join us. Together we’ll create solutions for a more connected, mobile and secure life.
For more information, visit www.entrustdatacard.com. Follow us on Twitter, YouTube and LinkedIn.
 
 
Entrust Datacard Corporation is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.
 
NO AGENCIES, NO RELOCATION
#LI-SD

Previous Job Searches

Similar Listings

ENGLEWOOD, Colorado, United States

📁 Engineering/IT/Security/Software Development

Requisition #: 190000KM

Shakopee, Minnesota, United States

📁 Engineering/IT/Security/Software Development

Requisition #: 190000AU

Shakopee, Minnesota, United States

📁 Engineering/IT/Security/Software Development

Requisition #: 190000KA