US
0 suggestions are available, use up and down arrow to navigate them
PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…
ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of Cybersecurity Principal Architect:
-
Employment Type:
Full-Time
-
Location:
Charlotte, NC (Onsite)
Do you meet the requirements for this job?
Cybersecurity Principal Architect
Pyramid Consulting, Inc
Charlotte, NC (Onsite)
Full-Time
Immediate need for a talented Cybersecurity Principal Architect. This is a 12+months contract opportunity with long-term potential and is located in Charlotte, NC /Atlanta, GA(Remote). Please review the job description below and contact me ASAP if you are interested.
Job ID:24-47359
Pay Range: $95 - $101/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy .
#cha J2W:CB3
Job ID:24-47359
Pay Range: $95 - $101/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
- Lead the planning, creation, and management of security architecture deliverables, including but not limited to requirements, solution designs, patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms and environments to influence CCS, Enterprise Technology, and line of business decision making.
- Acts as thought leader in new technology innovation, incubation, introduction and implementation critical to the CCS roadmap and Client’s success. Build roadmap for acquiring, integrating, and implementing high-value technology and processes.
- Oversee efforts (e.g. proof of concepts) to measure and prove new technology value.
- Lead development of system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.
- Create and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.
- Ensure that all acquired or developed security systems and security architectures integrate with enterprise security architecture.
- Establish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues.
- Facilitate, communicate, collaborate, and persuade others in the definition, adoption and implementation of a coherent architecture.
- Evaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability and ensure security product lifecycles are managed proactively.
- Demonstrate comprehensive experience and skill in Information Security (InfoSec) and cyber security technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation.
- Perform security reviews, identify gaps in security architecture and develop security risk management plans.
- Key Skills:Encryption
- Incident response
- Denial of service
- Firewall technologies and intrusion
- Cloud technologies and hosting;
- Operating system hardening;
- Virtualization technologies;
- Mobile technologies;
- Encryption, tokenization, and key management technologies;
- Endpoint Protection (includes malware);
- Data Loss Protection (DLP) technologies;
- AWS, Azure, Kubernetes, distributed, and/or mainframe
- Bachelor’s degree in computer science, MIS-related field, or equivalent education and related training
- Twelve years of progressively responsible leadership experience in Information/Cyber Security
- Comprehensive experience in application security architecture, including design tools, methods, and techniques and the application of defense-in-depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffs
- Experience creating architecture deliverables such as to requirements, solution designs, models, patterns, building blocks, sequence diagrams, and target architectures.
- Deep knowledge of:
- Several common technology stacks (i.e. AWS, Azure, Kubernetes, distributed, and/or mainframe) and how to secure them, including access control, data protection, monitoring, and integration with other technologies.
- Authentication and authorization technologies including privileged access management and remote access;
- Application security, the security development lifecycle, and ability to apply to client-server and web-based application development environments;
- Enterprise databases and database security, including database activity monitoring and database access control technologies;
- Encryption methods and technologies for data-in-transit and data-at-rest scenarios
- Incident response processes
- Denial of service prevention mechanisms;•Firewall technologies and intrusion prevention methods;
- Cloud technologies and hosting;
- Operating system hardening;
- Virtualization technologies;
- Mobile technologies;
- Encryption, tokenization, and key management technologies;
- Endpoint Protection (includes malware);
- Data Loss Protection (DLP) technologies;
- Desired Qualifications: The requirements listed below are representative of the knowledge, skill, and/or ability desired.
- Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- At least one major cybersecurity certification such as CISSP, CCSP, CISM, and/or GIAC certifications.
- Azure, AWS, and/or Kubernetes certifications
- Thorough knowledge of The Open Group Architecture Framework (TOGAF) or similar architecture framework, including infrastructure, data, information security, applications, architectural concepts, and associated disciplines.
- Experience in the financial services industry or another highly regulated industry.
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy .
#cha J2W:CB3
Get job alerts by email.
Sign up now!
Join Our Talent Network!