Interactive Business Systems is teaming up with a Menomonee Falls, WI company to locate and bring on an IT Security Architect for a direct hire opportunity!
Position Summary: As a senior member of Information Security team the enterprise security architect plays an integral role in defining and assessing the organization's security strategy, architecture and practices. The enterprise security architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services, evaluate and incorporate emerging technologies and evaluate changes to the threat landscapes. Interacts with senior leaders across the enterprise and acts as a trusted senior advisor.
1. Develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
2. Develop security strategy plans and roadmaps based on sound enterprise architecture practices.
3. Develop and maintain security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
4. Track developments and changes in the digital business and threat environments to ensure that they're adequately addressed in security strategy plans and architecture artifacts
5. Participate in application and infrastructure projects to provide security-planning advice
6. Draft security procedures and standards to be reviewed and approved by executive management and/or formally authorized by the CISO
7. Determine baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM)
8. Develop standards and practices for data encryption and tokenization in the organization, based on the organization's data classification criteria
9. Conduct or facilitate threat modeling of services and applications that tie to the risk and data associated with the service or application
10. Ensure a complete, accurate and valid inventory of all systems, infrastructure and applications that should be logged by the security information and event management (SIEM) or log management tool
11. Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, as well as counterparts within the network operations center (NOC)
12. Coordinate with the compliance office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization)
13. Validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable
14. Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems
15. Review network segmentation to ensure least privilege for network access
16. Liaise with the vendor management (VM) team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data:
a. Software as a service (SaaS) providers
b. Cloud/infrastructure as a service (IaaS) providers
c. Managed service providers (MSPs)
17. Evaluate the statements of work (SOWs) for these providers to ensure that adequate security protections are in place. Assess the providers' SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required 'user controls' and report any findings to the CISO and vendor management teams
18. Liaise with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls
19. Support the testing and validation of internal security controls, as directed by the CISO or the internal audit team
20. Review security technologies, tools and services, and make recommendations to the broader security team for their use, based on security, financial and operational metrics
21. Coordinate with operational and facility management teams to assess the security of operational technology (OT) and Medical Devices and systems
22. Liaise with other security architects and security practitioners to share best practices and insights
23. Liaise with the business continuity management (BCM) team to validate security practices for BCM testing and operations when a failover occurs