Dexian - Signature Consultants
Cyber Security Architect
Dexian - Signature Consultants, Morrisville, North Carolina, United States, 27560
Job Summary:Dexian is seeking a Cyber Security Architect for an opportunity with a client located in Morrisville, NC.Responsibilities:
Lead the planning, creation, and management of security architecture deliverables, including but not limited to requirements, solution designs, patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms and environments to influence CCS, Enterprise Technology, and line of business decision makingActs as thought leader in new technology innovation, incubation, introduction and implementation critical to the CCS roadmap and Truist's success. Build roadmap for acquiring, integrating, and implementing high–value technology and processes. Oversee efforts (e.g. proof of concepts) to measure and prove new technology valueLead development of system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standardsCreate and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standardsEnsure that all acquired or developed security systems and security architectures integrate with enterprise security architectureEstablish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues. Facilitate, communicate, collaborate, and persuade others in the definition, adoption and implementation of a coherent architectureEvaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability and ensure security product lifecycles are managed proactivelyDemonstrate comprehensive experience and skill in Information Security (InfoSec) and cyber security technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non–repudiationPerform security reviews, identify gaps in security architecture and develop security risk management plans
Required Qualifications:Bachelor's degree in Computer Science, MIS–related field, or equivalent education and related trainingTwelve years of progressively responsible leadership experience in Information/Cyber SecurityComprehensive experience in application security architecture, including design tools, methods, and techniques and the application of defense–in–depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffsExperience creating architecture deliverables such as to requirements, solution designs, models, patterns, building blocks, sequence diagrams, and target architecturesDeep knowledge of:Several common technology stacks (i.e. AWS, Azure, Kubernetes, distributed, and/or mainframe) and how to secure them, including access control, data protection, monitoring, and integration with other technologiesAuthentication and authorization technologies including privileged access management and remote accessApplication security, the security development lifecycle, and ability to apply to client–server and web–based application development environmentsEnterprise databases and database security, including database activity monitoring and database access control technologiesEncryption methods and technologies for data–in–transit and data–at–rest scenariosIncident response processesDenial of service prevention mechanismsFirewall technologies and intrusion prevention methodsCloud technologies and hostingOperating system hardeningVirtualization technologiesMobile technologiesEncryption, tokenization, and key management technologiesEndpoint Protection (includes malware)Data Loss Protection (DLP) technologiesDexian is a leading provider of staffing, IT, and workforce solutions with over 12,000 employees and 70 locations worldwide. As one of the largest IT staffing companies and the 2nd largest minority–owned staffing company in the U.S., Dexian was formed in 2023 through the merger of DISYS and Signature Consultants. Combining the best elements of its core companies, Dexian's platform connects talent, technology, and organizations to produce game–changing results that help everyone achieve their ambitions and goals.Dexian's brands include Dexian DISYS, Dexian Signature Consultants, Dexian Government Solutions, Dexian Talent Development and Dexian IT Solutions. Visit to learn more.Dexian is an Equal Opportunity Employer that recruits and hires qualified candidates without regard to race, religion, sex, sexual orientation, gender identity, age, national origin, ancestry, citizenship, disability, or veteran status.
#J-18808-Ljbffr
Lead the planning, creation, and management of security architecture deliverables, including but not limited to requirements, solution designs, patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms and environments to influence CCS, Enterprise Technology, and line of business decision makingActs as thought leader in new technology innovation, incubation, introduction and implementation critical to the CCS roadmap and Truist's success. Build roadmap for acquiring, integrating, and implementing high–value technology and processes. Oversee efforts (e.g. proof of concepts) to measure and prove new technology valueLead development of system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standardsCreate and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standardsEnsure that all acquired or developed security systems and security architectures integrate with enterprise security architectureEstablish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues. Facilitate, communicate, collaborate, and persuade others in the definition, adoption and implementation of a coherent architectureEvaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability and ensure security product lifecycles are managed proactivelyDemonstrate comprehensive experience and skill in Information Security (InfoSec) and cyber security technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non–repudiationPerform security reviews, identify gaps in security architecture and develop security risk management plans
Required Qualifications:Bachelor's degree in Computer Science, MIS–related field, or equivalent education and related trainingTwelve years of progressively responsible leadership experience in Information/Cyber SecurityComprehensive experience in application security architecture, including design tools, methods, and techniques and the application of defense–in–depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffsExperience creating architecture deliverables such as to requirements, solution designs, models, patterns, building blocks, sequence diagrams, and target architecturesDeep knowledge of:Several common technology stacks (i.e. AWS, Azure, Kubernetes, distributed, and/or mainframe) and how to secure them, including access control, data protection, monitoring, and integration with other technologiesAuthentication and authorization technologies including privileged access management and remote accessApplication security, the security development lifecycle, and ability to apply to client–server and web–based application development environmentsEnterprise databases and database security, including database activity monitoring and database access control technologiesEncryption methods and technologies for data–in–transit and data–at–rest scenariosIncident response processesDenial of service prevention mechanismsFirewall technologies and intrusion prevention methodsCloud technologies and hostingOperating system hardeningVirtualization technologiesMobile technologiesEncryption, tokenization, and key management technologiesEndpoint Protection (includes malware)Data Loss Protection (DLP) technologiesDexian is a leading provider of staffing, IT, and workforce solutions with over 12,000 employees and 70 locations worldwide. As one of the largest IT staffing companies and the 2nd largest minority–owned staffing company in the U.S., Dexian was formed in 2023 through the merger of DISYS and Signature Consultants. Combining the best elements of its core companies, Dexian's platform connects talent, technology, and organizations to produce game–changing results that help everyone achieve their ambitions and goals.Dexian's brands include Dexian DISYS, Dexian Signature Consultants, Dexian Government Solutions, Dexian Talent Development and Dexian IT Solutions. Visit to learn more.Dexian is an Equal Opportunity Employer that recruits and hires qualified candidates without regard to race, religion, sex, sexual orientation, gender identity, age, national origin, ancestry, citizenship, disability, or veteran status.
#J-18808-Ljbffr