Logo
CloudFlare

Enterprise Security Architect

CloudFlare, San Francisco, California, United States, 94199


Available Locations: Lisbon, Portugal, Mexico City, Mexico or Washington, DC or Remote US

About the role

As an Enterprise Security Architect you will play a key role in effectively designing defensible network architectures, defensible builds & configurations, security platforms and automation, assisting in secure tool and product development, and will help establish security standards and guidelines across the enterprise. This role will lead security project work with technology peers for successful delivery and coach technology staff on appropriate security standards, processes, protocols and needs as they implement new technology into the organization.

What You’ll Do

Works out and designs complex security solutions.

Leads projects to implement secure enterprise systems and identifies issues that could compromise data integrity or security.

Develops security policies, procedures, and guidelines and recommends necessary changes to a given project team to ensure the company’s systems are fully compliant with all applicable regulatory requirements and privacy laws.

Creating and implementing enterprise security architecture models

Utilizes open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld.

Serving as an advisor to engineering and development teams in security best practices and design.

Leads security-related projects from inception to successful completion and is capable of effectively coaching technology staff on appropriate security protocols and needs as they implement new technology into the organization.

Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors.

Determines methods and procedures on new assignments and may coordinate activities of other personnel.

Having wide-ranging experience, uses professional concepts and company objectives to resolve complex issues in creative and effective ways

Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results.

Ensures an organization's security strategy is aligned with companies business goals.

Examples of desirable skills, knowledge and experience.

15+ years of experience in an IT/Security related field, 7 of which as a security architect.

In-depth understanding of security concepts.

Understand how business, engineering, IT, and security processes align, and how to research, test, and implement solutions to complex objectives.

Able to anticipate challenges and steer the company towards growth.

In depth knowledge of the following:

Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private and hybrid environments.

Extensive knowledge of security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.

Experience with one or more of the following: ISO 27001, NIST, Payment Card Industry Data Security Standard (PCI DSS), Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2, FedRamp Moderate - High.

Works effectively with a variety of personalities and can adapt his/her approach to effectively reach and develop his/her team. Uses this skill as well as their functional knowledge to both earn and maintain a high level of credibility with the team.

Experience in modeling and graphic representations.

Network and security technologies and protocols and how they relate to security by design and implementation.

Network security principles and best practices.

Designing and managing secure network architectures.

Secure configuration management processes

Security reviews, identify gaps in security architecture, and develop a security risk management plan.

Container-based architectures and implementations such as Kubernetes, Docker, etc.

Security controls and countermeasures including practical experience with identity management, cyber-security, and IT processes and solutions

#J-18808-Ljbffr