A SecArch Generalist has the following responsibilities:

1. Lead SecArch deep dives with the requestor of the assessment
2. Prioritize risks identified in relation to business risks
3. Conduct assessment and provide technology risk/requirements to the requestor.

Areas covered:
a. Authentication, Authorization, Auditing
b. Application Security Session Security, Vulnerability/Pen Testing items, Input Validation
c. Secure data transport and storage
4. Periodically review security reference architecture (security blueprints) and conduct updates/enhancements
5. Participate in various Operational and Technology Risk governance processes
6. Assist in identifying new areas and opportunities of technology investment for the firm

Skills and Experience
Soft Skills (Required)
1. Excellent communication skills: written, oral, presentation, listening
2. Ability to influence through factual reasoning
3. Time management: ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking
4. Strong focus on delivery when presented with short timelines and increased involvement from senior management
5. Ability to adjust communication of technology risks vs business risks based on the audience

Security Architecture Skills
1. Required In depth knowledge of application, network and platform security vulnerabilities. Ability to explain these vulnerabilities to developers
2. Required Experience in conducting Information Security, IT Security, Audit assessments. Presenting the outcomes of the assessment and obtaining buy in.
3. Required Strong focus on reviewing technical designs and functional requirements to identify areas of Security weakness.
4. Required The candidate must have working experience in the following application/network security domains:
a. Authentication: SAML, SiteMinder, Kerberos, OpenId
b. Entitlements and identity management
c. Data protection, data leakage prevention and secure data transfer and storage
d. App Security - validation checking, software attack methodologies
e. Cryptography encryption and hashing
5. Desired Knowledge of standard network model and the risks that present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, vpn, and load-balancers, and to understand network architecture.
6. Desired - The candidate must have working knowledge of the primary operating systems (Unix, Windows, z/OS, Mac OS), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks.
7. Desired - experience in testing tools, at least one of Veracode, Fortify, OunceLabs, AppScan, WebInspect, Burp
Development Experience
1. Required Even though the SecArch Integrator role is not a development role, the candidate must have previous background in programming, design and application architecture.
2. Required In order to be a practical SecArch Integrator the candidate must have experience implementing complex applications in an enterprise environment.
3. Required working knowledge of programming and scripting languages: Java, JavaScript, C#, C/C++, Perl, Python, Ruby
4. Desired In-depth knowledge of web technologies such as Web Browsers, Web Servers, Web Services
Other Areas of Expertise
1. Frameworks, protocols and subsystems: J2EE, .NET, Spring, RPC, SOAP, MQSeries, JMS, RMI, JMX, Hibernate.
2. Knowledge of JSP /Servlet/EJB or ASP.NET, HTTP/HTTPS, Cookies, AJAX, JavaScript, Flex / Silverlight.
3. Database design and programming experience
4. Experience of liaising with 3rd Party Entities (exchanges, suppliers, regulators)
5. Experience in conducting and / or reviewing penetration tests, dynamic vulnerability assessments and static vulnerability assessments
6. Understanding of geographic regulations and their impact on Security assessments
7. Previous experience in Financial Services is preferred
8. CISSP or other industry qualification
9. Desired experience working with global organizations

Educational Requirements
Bachelor s Degree with minimum 5 years relevant work experience in high-paced, enterprise environment

- provided by Dice
Associated topics: cybersecurity, identity, identity access management, iam, information assurance, information technology security, leak, malicious, protect, vulnerability

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!

Upload your resume

Loading some great jobs for you...