ZOLL Resuscitation
Information Security Architect
ZOLL Resuscitation, Orlando, Florida, us, 32885
CorporateAt ZOLL, we're passionate about improving patient outcomes and helping save lives. We provide innovative technologies that make a meaningful difference in people's lives. Our medical devices, software and related services are used worldwide to diagnose and treat patients suffering from serious cardiopulmonary and respiratory conditions.
Job Type
Remote
Job Summary
The Information Security Architect is a mid to senior level individual contributor responsible to plan, analyze, design, configure, test, implement, maintain and support ZOLL's computer and network security infrastructure. The Security Architect is responsive to changes in regulations and risk and works proactively to anticipate both regulatory changes as well as changes in the threat landscape. The Security Architect possesses a comprehensive awareness of ZOLL's technology and information needs and leverages that awareness to develop and test security structures to protect the company's systems.
Essential FunctionsLead engagement with IT stakeholders, business management, and other strategic partners to support the design, development, and deployment of enterprise Information Security solutions that span multiple technologies and disciplines.Develop Enterprise Architecture principles to align IT security architecture with business strategies to achieve short and long-term goals; builds reference architectures and drives architectural security alignment across the enterprise.Design and implement network intrusion detection (IDS), data loss prevention (DLP), cloud access security broker (CASB), Firewalls, and other relevant solutions to strengthen Information Security posture.Assist in the analysis of security breaches to determine root cause.Research, recommend, and oversee the installation of appropriate tools and/or countermeasures to improve information security posture and reduce risk.Work with software development partners and leaders to maintain and grow a secure software delivery pipeline.Design and implement the necessary Information Security architecture to mitigate threats as they emerge.Participate in and drive the establishment of architecture and development standards to strengthen ZOLL's Information Security program.Conduct staff training on network and information security procedures and best practices.Align standards, frameworks, and security with overall business and technology strategies.Identify and communicate current and emerging security threats.Oversee and maintain the integrity of the current and proposed architectures to assure quality, consistency, and adherence to established standards in the face of political and business pressures.Research and recommend security enhancements and purchases.Define and manage a review process to evaluate project proposals for effectiveness within the ZOLL environment.Promote the sharing of Information Security best practices across the ZOLL environment to reduce costs and improve Information Security posture.Facilitate interaction across all architect roles within the enterprise; work with solution and domain architect(s) to provide a consensus-based enterprise solution that is scalable, adaptable, and in synchronization with ever-changing business needs.Lead the development of policies, standards, and guidelines that direct the selection, development, implementation, and use of information technology within the enterprise.Utilize broad technical leadership that impacts technical direction and exerts influence throughout the organization.Collaborate with the PMO to develop project plans, milestones, and deliverables for enterprise IT initiatives.Adhere to IT Service Management controls including change management, incident management, etc.Create documentation of the technical environment, associated actions, and results.
Required/Preferred Education and ExperienceBachelor's Degree preferred10+ years of industry experience requiredExperience with software development, cloud architecture, vulnerability management, and risk management disciplinesExperience with secure solution design, coding practices and secure SDLCExperience with information security concepts and frameworks (NIST, ISO, HITRUST, COBIT, etc.)Experience with operating system security models and/or mechanismsExperience in threat modeling and weakness analysisExperience conducting and directing penetration testing and security auditsExperience with Threat Intelligence toolsExperience with Malware SandboxExperience with scripting languagesExperience implementing multi-factor authentication, single sign-on, identity management or related technologies
Knowledge, Skills and AbilitiesAdvanced understanding of security technologies (e.g. anti-virus, DLP, IDS, firewalls, etc.) including knowledge of best practices and usage in a mid-size enterprise.Advanced knowledge of risk assessment tools, technologies, and methods.Demonstrated ability to plan, research, and develop Information Security policies, standards, and procedures.Extensive knowledge of enterprise security programs including best practices.Extensive knowledge of security operations, architectures, policies, and standards.Extensive knowledge of logging, monitoring, and retention and usage of SIEM technologies.Be highly skilled and able to perform threat hunting Automation & Orchestration.Excellent knowledge of Firewalls/WAN/WAF/LAN/Endpoint Security.Excellent knowledge of security tools such as: Tenable, Nessus, Crowdstrike Falcon, Protocol Analyzers, DLP, NAC, SIEM, IPS/IDS, etc.Knowledge of disaster recovery, computer forensic tools, technologies, and methods.Knowledge of Cloud Services Security specifically Azure and AWS services.Ability to interact with a broad cross-section of personnel to explain and enforce security measures.
Physical Demands
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.Standing - OccasionallyWalking - OccasionallySitting - ConstantlyTalking - OccasionallyHearing - OccasionallyRepetitive Motions - Frequently
Compensation for this position is $155K-$170K. Final compensation will be determined by various factors such as a candidate's relevant work experience, skills, certifications, and location.
If you would like to be considered for this role, we are asking that all applicants please apply by the end of the day on Friday, November 29, 2024.ZOLL is a fast-growing company that operates in more than 140 countries around the world. Our employees are inspired by a commitment to make a difference in patient's lives, and our culture values innovation, self-motivation and an entrepreneurial spirit. Join us in our efforts to improve outcomes for underserved patients suffering from critical cardiopulmonary conditions and help save more lives.All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
#J-18808-Ljbffr
Job Type
Remote
Job Summary
The Information Security Architect is a mid to senior level individual contributor responsible to plan, analyze, design, configure, test, implement, maintain and support ZOLL's computer and network security infrastructure. The Security Architect is responsive to changes in regulations and risk and works proactively to anticipate both regulatory changes as well as changes in the threat landscape. The Security Architect possesses a comprehensive awareness of ZOLL's technology and information needs and leverages that awareness to develop and test security structures to protect the company's systems.
Essential FunctionsLead engagement with IT stakeholders, business management, and other strategic partners to support the design, development, and deployment of enterprise Information Security solutions that span multiple technologies and disciplines.Develop Enterprise Architecture principles to align IT security architecture with business strategies to achieve short and long-term goals; builds reference architectures and drives architectural security alignment across the enterprise.Design and implement network intrusion detection (IDS), data loss prevention (DLP), cloud access security broker (CASB), Firewalls, and other relevant solutions to strengthen Information Security posture.Assist in the analysis of security breaches to determine root cause.Research, recommend, and oversee the installation of appropriate tools and/or countermeasures to improve information security posture and reduce risk.Work with software development partners and leaders to maintain and grow a secure software delivery pipeline.Design and implement the necessary Information Security architecture to mitigate threats as they emerge.Participate in and drive the establishment of architecture and development standards to strengthen ZOLL's Information Security program.Conduct staff training on network and information security procedures and best practices.Align standards, frameworks, and security with overall business and technology strategies.Identify and communicate current and emerging security threats.Oversee and maintain the integrity of the current and proposed architectures to assure quality, consistency, and adherence to established standards in the face of political and business pressures.Research and recommend security enhancements and purchases.Define and manage a review process to evaluate project proposals for effectiveness within the ZOLL environment.Promote the sharing of Information Security best practices across the ZOLL environment to reduce costs and improve Information Security posture.Facilitate interaction across all architect roles within the enterprise; work with solution and domain architect(s) to provide a consensus-based enterprise solution that is scalable, adaptable, and in synchronization with ever-changing business needs.Lead the development of policies, standards, and guidelines that direct the selection, development, implementation, and use of information technology within the enterprise.Utilize broad technical leadership that impacts technical direction and exerts influence throughout the organization.Collaborate with the PMO to develop project plans, milestones, and deliverables for enterprise IT initiatives.Adhere to IT Service Management controls including change management, incident management, etc.Create documentation of the technical environment, associated actions, and results.
Required/Preferred Education and ExperienceBachelor's Degree preferred10+ years of industry experience requiredExperience with software development, cloud architecture, vulnerability management, and risk management disciplinesExperience with secure solution design, coding practices and secure SDLCExperience with information security concepts and frameworks (NIST, ISO, HITRUST, COBIT, etc.)Experience with operating system security models and/or mechanismsExperience in threat modeling and weakness analysisExperience conducting and directing penetration testing and security auditsExperience with Threat Intelligence toolsExperience with Malware SandboxExperience with scripting languagesExperience implementing multi-factor authentication, single sign-on, identity management or related technologies
Knowledge, Skills and AbilitiesAdvanced understanding of security technologies (e.g. anti-virus, DLP, IDS, firewalls, etc.) including knowledge of best practices and usage in a mid-size enterprise.Advanced knowledge of risk assessment tools, technologies, and methods.Demonstrated ability to plan, research, and develop Information Security policies, standards, and procedures.Extensive knowledge of enterprise security programs including best practices.Extensive knowledge of security operations, architectures, policies, and standards.Extensive knowledge of logging, monitoring, and retention and usage of SIEM technologies.Be highly skilled and able to perform threat hunting Automation & Orchestration.Excellent knowledge of Firewalls/WAN/WAF/LAN/Endpoint Security.Excellent knowledge of security tools such as: Tenable, Nessus, Crowdstrike Falcon, Protocol Analyzers, DLP, NAC, SIEM, IPS/IDS, etc.Knowledge of disaster recovery, computer forensic tools, technologies, and methods.Knowledge of Cloud Services Security specifically Azure and AWS services.Ability to interact with a broad cross-section of personnel to explain and enforce security measures.
Physical Demands
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.Standing - OccasionallyWalking - OccasionallySitting - ConstantlyTalking - OccasionallyHearing - OccasionallyRepetitive Motions - Frequently
Compensation for this position is $155K-$170K. Final compensation will be determined by various factors such as a candidate's relevant work experience, skills, certifications, and location.
If you would like to be considered for this role, we are asking that all applicants please apply by the end of the day on Friday, November 29, 2024.ZOLL is a fast-growing company that operates in more than 140 countries around the world. Our employees are inspired by a commitment to make a difference in patient's lives, and our culture values innovation, self-motivation and an entrepreneurial spirit. Join us in our efforts to improve outcomes for underserved patients suffering from critical cardiopulmonary conditions and help save more lives.All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
#J-18808-Ljbffr