ASR Group
Security Architect
ASR Group, Tallahassee, Florida, United States,
Florida Crystals is a leading domestic sugar producer and North America’s first fully integrated cane sugar company, guiding our sugar from farm to table. We are America’s first and only producer of certified organic sugar, grown and harvested in the United States. Our renewable energy facility is the largest of its kind in North America and provides clean energy that powers our sugar operations, which helps us reduce our use of fossil fuels. Florida Crystals also sustainably farms rice, sweet corn, and other vegetables in rotation with our sugarcane. Our rice mill is the only rice mill in Florida.OVERVIEW
The Information Security Architect position reports directly to the Sr. Director of Information Security. The primary focus of this position is to envision, design, and implement new security solutions, participate in hardening and evolving the company’s existing security architecture, and provide threat modeling, risk mitigation, and incident response expertise. In addition, the Security Architect will collaborate as a technical leader with senior IT and business management to advance the security strategy and drive the execution of the security roadmap.The Security Architect should possess deep expertise in the company's security processes across various domains and disciplines, including on-premise and cloud/SaaS applications, data, infrastructure, and mobile solutions. Success in this role requires a highly collaborative approach, strong communication with peers, management, and leadership, and the ability to lead cross-functional initiatives. Additionally, the Security Architect must respond swiftly and decisively to security issues or demands as they arise.DETAILED ROLES & RESPONSIBILITIES
Performs security architecture, related documentation, and validates solution designs spanning multiple domains: SAP and other critical business applications, Data, Cloud and On-prem Infrastructure, Mobile, Networking, Operational Technology (OT), etc.Create, manage, and update Standard Operating Procedures as needed.Functions as a Subject Matter Expert (SME) regarding security integrations and authentication elements such as Microsoft Security, Azure Security, O365 Security, SSO (SAML, OIDC, LDAP, etc.), Certificates, Multi-Factor Authentication, VPN, ZTNA Architecture, Active Directory Federation, Reverse Proxy, Identity and Access Management, SIEM, e-mail security solutions (Abnormal, Defender, Proofpoint, etc.), URL Filtering (ForcePoint), PAM, SecureAuth, etc.Works closely with the Security Engineer(s), Infrastructure, SAP BASIS, Partners, and Solutions teams to ensure designs are functionally sound and based on best practice security standards.Works expressly with the Enterprise Architecture team to design, validate and implement effective and compliant Security Controls; cooperates on implementing a compliance-based Segregation of Duties (SoD) strategy and robust, risk-based operational security model; takes an active role to ensure consistency of standards, practices and policies related to security operations and implemented solutions.Works with security peers, Infrastructure, BASIS, Partners, and others to evolve security-related processes and implement risk-based, prioritized security; leads effort and coordination with Infrastructure and Managed Security Service Provider(s) on asset management cataloguing for risk mitigation/risk assessment purposes.Collaborates on Security Integration architectures for corporate acquisitions.Evaluates security questionnaires for vendors and analyses the potential security impact including risks, threats, vulnerabilities, and process bottlenecks for solutions under consideration, and ensures solutions (application, service, database, network, infrastructure, mobile, cloud) can be implemented using best practice standards and innovations.Leads internal initiatives to periodically review and perform operational risk assessments and analysis, vulnerability reviews, compliance violation checks, partner re-certifications, penetration testing and other activities to address potential security risks.Participates in corporate and external security audit proceedings.Coordinates the security patch management program for servers, systems, applications, and devices.Leads the effort to architect and validate a preferred IAM solution and designing the integration points.Functions as the lead to evolve the SIEM / Advanced (Real-time) Threat Management strategy and its functional architecture.Coordinates inner team and cross-team communications and activities that improve and sustain operational security functions related to support, maintenance, optimizations, and projects as warranted.Provides relevant security training to team members to improve their skills and abilities as security professionals.Stays current on modern-day security practices and techniques and evaluates new offerings and methodologies that potentially minimize the company’s security risk on an ongoing basis.Establish a threat modeling methodology to identify, classify, prioritize, and report on cyber threats using a structured approach.Collect information on threats to the organization through communication with other partner institutions, mailing lists, open-source news, and industry partnerships.Provide awareness to internal teams and leadership on changes to the cyber threat landscape.WORK EXPERIENCES
8+ years of experience as an IT Security professional with at least 5 years architecting and leading solutions in a hybrid environment with a heavy focus on Microsoft and/or Azure.Broad security knowledge working in a heterogeneous environment of diverse applications, systems, databases, SaaS solutions, and on-premise as well as Cloud-based security offerings.EDUCATION REQUIREMENTS
A minimum of a Bachelor’s Degree in Information Systems, Computer Science, Engineering, or equivalent experience.In lieu of a Bachelor’s Degree, 8+ years of relevant field experience will be considered.CISSP, Microsoft/Azure, and/or SANS certification preferred.Significant understanding and experience working in complex and distributed IT environments, applying security expertise involving both on-premise and cloud-based solutions.Strong understanding of security and risk mitigation strategies.Expert understanding of Microsoft security strategies and platforms, Azure security, O365 security, Active Directory / Federation Model, Multi-factor authentication, SSO, SAML, OAUTH, SSL Certificates, etc.Working understanding of SAP’s Security Architecture Model and experience with SAP Application Security: ECC, GRC, IAM, SuccessFactors, CRM, EP, Solution Manager, PLM, HANA, HCM, Analytics Cloud, etc. is preferred.Ability to create clear and concise documentation targeted at the appropriate audience – IT executives, Internal Business Clients, and technical teams.Demonstrated knowledge of common adversary tactics, techniques, and procedures (TTPs).Intimate knowledge of the Cyber Kill Chain, MITRE ATT&CK, and other relevant network defense and intelligence frameworks.Experience with collecting, analyzing, and interpreting technical data from multiple sources, documenting the results, and providing meaningful analysis products.Must demonstrate assertiveness and leadership qualities, deliver excellence in verbal and written communication, and prioritize effectively.Must be capable of creating architecture and related documents for pre-existing solutions and implementations.Must be capable of collaborating with others regarding critical security decisions and policy and have others feel their input is being considered when decisions affect multiple teams and/or the Business.LOCATION OF ROLE
West Palm Beach, FLWe are an equal opportunity employer. We do not discriminate on the basis of race, color, creed, religion, gender, sexual orientation, gender identity, age, national origin, disability, veteran status or any other category protected under federal, state, or local law. All employment is decided on the basis of qualifications, merit, and business need.
#J-18808-Ljbffr
The Information Security Architect position reports directly to the Sr. Director of Information Security. The primary focus of this position is to envision, design, and implement new security solutions, participate in hardening and evolving the company’s existing security architecture, and provide threat modeling, risk mitigation, and incident response expertise. In addition, the Security Architect will collaborate as a technical leader with senior IT and business management to advance the security strategy and drive the execution of the security roadmap.The Security Architect should possess deep expertise in the company's security processes across various domains and disciplines, including on-premise and cloud/SaaS applications, data, infrastructure, and mobile solutions. Success in this role requires a highly collaborative approach, strong communication with peers, management, and leadership, and the ability to lead cross-functional initiatives. Additionally, the Security Architect must respond swiftly and decisively to security issues or demands as they arise.DETAILED ROLES & RESPONSIBILITIES
Performs security architecture, related documentation, and validates solution designs spanning multiple domains: SAP and other critical business applications, Data, Cloud and On-prem Infrastructure, Mobile, Networking, Operational Technology (OT), etc.Create, manage, and update Standard Operating Procedures as needed.Functions as a Subject Matter Expert (SME) regarding security integrations and authentication elements such as Microsoft Security, Azure Security, O365 Security, SSO (SAML, OIDC, LDAP, etc.), Certificates, Multi-Factor Authentication, VPN, ZTNA Architecture, Active Directory Federation, Reverse Proxy, Identity and Access Management, SIEM, e-mail security solutions (Abnormal, Defender, Proofpoint, etc.), URL Filtering (ForcePoint), PAM, SecureAuth, etc.Works closely with the Security Engineer(s), Infrastructure, SAP BASIS, Partners, and Solutions teams to ensure designs are functionally sound and based on best practice security standards.Works expressly with the Enterprise Architecture team to design, validate and implement effective and compliant Security Controls; cooperates on implementing a compliance-based Segregation of Duties (SoD) strategy and robust, risk-based operational security model; takes an active role to ensure consistency of standards, practices and policies related to security operations and implemented solutions.Works with security peers, Infrastructure, BASIS, Partners, and others to evolve security-related processes and implement risk-based, prioritized security; leads effort and coordination with Infrastructure and Managed Security Service Provider(s) on asset management cataloguing for risk mitigation/risk assessment purposes.Collaborates on Security Integration architectures for corporate acquisitions.Evaluates security questionnaires for vendors and analyses the potential security impact including risks, threats, vulnerabilities, and process bottlenecks for solutions under consideration, and ensures solutions (application, service, database, network, infrastructure, mobile, cloud) can be implemented using best practice standards and innovations.Leads internal initiatives to periodically review and perform operational risk assessments and analysis, vulnerability reviews, compliance violation checks, partner re-certifications, penetration testing and other activities to address potential security risks.Participates in corporate and external security audit proceedings.Coordinates the security patch management program for servers, systems, applications, and devices.Leads the effort to architect and validate a preferred IAM solution and designing the integration points.Functions as the lead to evolve the SIEM / Advanced (Real-time) Threat Management strategy and its functional architecture.Coordinates inner team and cross-team communications and activities that improve and sustain operational security functions related to support, maintenance, optimizations, and projects as warranted.Provides relevant security training to team members to improve their skills and abilities as security professionals.Stays current on modern-day security practices and techniques and evaluates new offerings and methodologies that potentially minimize the company’s security risk on an ongoing basis.Establish a threat modeling methodology to identify, classify, prioritize, and report on cyber threats using a structured approach.Collect information on threats to the organization through communication with other partner institutions, mailing lists, open-source news, and industry partnerships.Provide awareness to internal teams and leadership on changes to the cyber threat landscape.WORK EXPERIENCES
8+ years of experience as an IT Security professional with at least 5 years architecting and leading solutions in a hybrid environment with a heavy focus on Microsoft and/or Azure.Broad security knowledge working in a heterogeneous environment of diverse applications, systems, databases, SaaS solutions, and on-premise as well as Cloud-based security offerings.EDUCATION REQUIREMENTS
A minimum of a Bachelor’s Degree in Information Systems, Computer Science, Engineering, or equivalent experience.In lieu of a Bachelor’s Degree, 8+ years of relevant field experience will be considered.CISSP, Microsoft/Azure, and/or SANS certification preferred.Significant understanding and experience working in complex and distributed IT environments, applying security expertise involving both on-premise and cloud-based solutions.Strong understanding of security and risk mitigation strategies.Expert understanding of Microsoft security strategies and platforms, Azure security, O365 security, Active Directory / Federation Model, Multi-factor authentication, SSO, SAML, OAUTH, SSL Certificates, etc.Working understanding of SAP’s Security Architecture Model and experience with SAP Application Security: ECC, GRC, IAM, SuccessFactors, CRM, EP, Solution Manager, PLM, HANA, HCM, Analytics Cloud, etc. is preferred.Ability to create clear and concise documentation targeted at the appropriate audience – IT executives, Internal Business Clients, and technical teams.Demonstrated knowledge of common adversary tactics, techniques, and procedures (TTPs).Intimate knowledge of the Cyber Kill Chain, MITRE ATT&CK, and other relevant network defense and intelligence frameworks.Experience with collecting, analyzing, and interpreting technical data from multiple sources, documenting the results, and providing meaningful analysis products.Must demonstrate assertiveness and leadership qualities, deliver excellence in verbal and written communication, and prioritize effectively.Must be capable of creating architecture and related documents for pre-existing solutions and implementations.Must be capable of collaborating with others regarding critical security decisions and policy and have others feel their input is being considered when decisions affect multiple teams and/or the Business.LOCATION OF ROLE
West Palm Beach, FLWe are an equal opportunity employer. We do not discriminate on the basis of race, color, creed, religion, gender, sexual orientation, gender identity, age, national origin, disability, veteran status or any other category protected under federal, state, or local law. All employment is decided on the basis of qualifications, merit, and business need.
#J-18808-Ljbffr