Epicareer Might not Working Properly
Learn More

Cybersecurity Architecture

Salary undisclosed

Checking job availability...

Original
Simplified

Responsibilities:

The position requires an understanding of information security architecture, security

requirements for IT projects and deployments, and ability to run and evaluate security solutions.

Specifically, the resource will perform the following responsibilities under the guidance and

supervision of the Senior IT Specialist (Information Security):

• Facilitate the end-to-end security clearance process (SLtO – Security License to

Operate) for new solution deployments and IT projects by working closely with

project/deployment teams to understand the security architecture, draft the security

clearance checklist by identifying which security checks are applicable based on the

nature of the IT project/solution and give guidance on how to fulfill these requirements;

• Oversee the end-to-end penetration testing process

applications and infrastructure, which includes the administrative tasks (RFP – Request

for Proposal from pentest firms, onboarding, scheduling of walkthrough meetings and

pentest proper, and filing requests for user and network access as needed), ensuring that

pentest findings are addressed and well-documented, and ensuring that pentest

engagements are closed properly.

• Assess the day-to-day RFCs (Requests for Change), enhancements to existing

solutions, and other ad hoc consultations for security requirements.

• Work closely with project/deployment teams, CAB administrators and relevant parties to

guide them in fulfilling security requirements.

• Work closely with IT Risks focal and action owners to monitor and close operational risks

(i.e. risks identified after go-live)

• Manage security tools, such as WAF (Web Application Firewall). Lead the process and

tool improvement initiatives

• Manage e-Signature tools, serve as L1 support for business users and coordinate with

vendor for technical support as needed

• Lead a sub-team focused on Cybersecurity architecture compliance, penetration testing

process, security requirements for changes and security research-related tasks;

• Support the cyber security due diligence process for third party IT solution providers;

• Develop, update, or revise Cybersecurity Architecture guardrails, processes and

procedures

• Develop security training materials, such as presentations and handouts, as needed;

• Spot opportunities to improve or strengthen security controls or processes in own areas

of work;

• Conduct risk assessments from a security architecture perspective;

• Draw up technical evaluation criteria for evaluating security solutions;

• Coordinate the conduct of Requests for Information (RFIs) and Proofs of Concept (POCs)

on security technologies; and

• Other duties that may be assigned by the supervisor.

Qualifications:

• Have a good working knowledge of and at least 6 years of IT Security and/or Security

Architecture experience.

• Have experience and knowledge in conducting security risk or security architecture

assessments.

• Bachelor's degree in any IT-related major and security-related certifications such as

CISSP, CISM, GSEC, CEH or equivalent (or extensive, relevant experience).

• Broad range of knowledge of Information and Communications Technology as applied in

an enterprise environment.

• Should possess ability to design security architecture, coordinate requirements

development, and solutions definition.

• Knowledgeable on cyber security and IT governance frameworks such as NIST CSF,

SWIFT CSP, CIS Benchmark, OWASP, COBIT, ITIL, and ISO 27000 series. Actual

experience in their implementation and operation is an advantage.

• Knowledge of cloud technologies such as Microsoft Azure, AWS is an advantage.

• Capable of security analysis that is typically needed in designing, reviewing, or

conducting assessments of security architecture, application functions and IT

infrastructure.

• Very attentive to details and methodical with work.

• Strong communication and interpersonal skills and ability to operate in a matrixed

environment.

• Ability to articulate ideas and present them meaningfully in a verbal or written context.

• Should have ability to handle multiple tasks and priorities.

• Should be able to establish good networking relationships with colleagues in own unit,

within ITD, and in some cases, outside of ITD.

• Should be able to anticipate security risks or issues, provide recommendations to the

supervisor on addressing those issues, or address the less complex ones.

• Should be able to guide more junior analysts.

• Carries out work independently and proactively with minimal supervision or follow up.

Responsibilities:

The position requires an understanding of information security architecture, security

requirements for IT projects and deployments, and ability to run and evaluate security solutions.

Specifically, the resource will perform the following responsibilities under the guidance and

supervision of the Senior IT Specialist (Information Security):

• Facilitate the end-to-end security clearance process (SLtO – Security License to

Operate) for new solution deployments and IT projects by working closely with

project/deployment teams to understand the security architecture, draft the security

clearance checklist by identifying which security checks are applicable based on the

nature of the IT project/solution and give guidance on how to fulfill these requirements;

• Oversee the end-to-end penetration testing process

applications and infrastructure, which includes the administrative tasks (RFP – Request

for Proposal from pentest firms, onboarding, scheduling of walkthrough meetings and

pentest proper, and filing requests for user and network access as needed), ensuring that

pentest findings are addressed and well-documented, and ensuring that pentest

engagements are closed properly.

• Assess the day-to-day RFCs (Requests for Change), enhancements to existing

solutions, and other ad hoc consultations for security requirements.

• Work closely with project/deployment teams, CAB administrators and relevant parties to

guide them in fulfilling security requirements.

• Work closely with IT Risks focal and action owners to monitor and close operational risks

(i.e. risks identified after go-live)

• Manage security tools, such as WAF (Web Application Firewall). Lead the process and

tool improvement initiatives

• Manage e-Signature tools, serve as L1 support for business users and coordinate with

vendor for technical support as needed

• Lead a sub-team focused on Cybersecurity architecture compliance, penetration testing

process, security requirements for changes and security research-related tasks;

• Support the cyber security due diligence process for third party IT solution providers;

• Develop, update, or revise Cybersecurity Architecture guardrails, processes and

procedures

• Develop security training materials, such as presentations and handouts, as needed;

• Spot opportunities to improve or strengthen security controls or processes in own areas

of work;

• Conduct risk assessments from a security architecture perspective;

• Draw up technical evaluation criteria for evaluating security solutions;

• Coordinate the conduct of Requests for Information (RFIs) and Proofs of Concept (POCs)

on security technologies; and

• Other duties that may be assigned by the supervisor.

Qualifications:

• Have a good working knowledge of and at least 6 years of IT Security and/or Security

Architecture experience.

• Have experience and knowledge in conducting security risk or security architecture

assessments.

• Bachelor's degree in any IT-related major and security-related certifications such as

CISSP, CISM, GSEC, CEH or equivalent (or extensive, relevant experience).

• Broad range of knowledge of Information and Communications Technology as applied in

an enterprise environment.

• Should possess ability to design security architecture, coordinate requirements

development, and solutions definition.

• Knowledgeable on cyber security and IT governance frameworks such as NIST CSF,

SWIFT CSP, CIS Benchmark, OWASP, COBIT, ITIL, and ISO 27000 series. Actual

experience in their implementation and operation is an advantage.

• Knowledge of cloud technologies such as Microsoft Azure, AWS is an advantage.

• Capable of security analysis that is typically needed in designing, reviewing, or

conducting assessments of security architecture, application functions and IT

infrastructure.

• Very attentive to details and methodical with work.

• Strong communication and interpersonal skills and ability to operate in a matrixed

environment.

• Ability to articulate ideas and present them meaningfully in a verbal or written context.

• Should have ability to handle multiple tasks and priorities.

• Should be able to establish good networking relationships with colleagues in own unit,

within ITD, and in some cases, outside of ITD.

• Should be able to anticipate security risks or issues, provide recommendations to the

supervisor on addressing those issues, or address the less complex ones.

• Should be able to guide more junior analysts.

• Carries out work independently and proactively with minimal supervision or follow up.