Cloud Security Strategist
"
We're seeking a seasoned security professional to lead the design and implementation of comprehensive security strategies for cloud, network, application, identity, data and hybrid environments.
"
The ideal candidate will have at least 15 years of experience in information security, with a proven track record of designing and reviewing complex security architectures for cloud, on-premises and hybrid environments.
"
• Collaborate closely with cross-functional teams to embed security principles throughout technology development and deployment phases.
• Play a key role in security architecture design reviews and create and maintain baseline security documentation to support compliance, risk management and security posture improvement.
• Actively participate in Technology Governance Board to evaluate new technologies, assess their security risks, and provide recommendations for adoption to meet industry standards.
• Architect and implement security controls for cloud environment leveraging best practices for securing AWS and Azure infrastructure, services and applications.
• Stay up-to-date with the latest cloud security trends, tools, and services applying them to our cloud security strategy.
• Maintain expertise in security regulations and frameworks (e.g., NIST, ISO 27001, PCI DSS) to design systems and processes that protect data and demonstrate adherence to industry standards.
• Formulate and communicate a comprehensive security architecture strategy to safeguard company information and data assets, focusing on confidentiality, integrity, and availability.
• Continuously monitor emerging threats and industry standards to evolve our security posture.
• Define, document, and promote security architecture and technical standards across company.
• Lead the design and implementation of comprehensive security strategies for networks, applications, identity, data and cloud environments, effectively countering existing and emerging threats.
• Cross-train a team of security professionals providing cyber technical leadership across security domains.
• Direct hands-on design reviews and implementation assessments of security solutions across network, application, identity, data and cloud domains.
• Assess security risks in existing and planned systems, establishing technical security standards and governance processes.
• Recommend design patterns and security best practices for technology implementations.
• Support the development of reference architectures and associated reusable work products and assessment assets including detailed designs that provide deployable building blocks.
• Research, evaluate, and recommend state-of-the-art security technologies and tools.
"]},
Read more