Jobs in 
Richmond, VA
 - made simple.
RVA Jobs is your home for work in Richmond, Henrico, Chesterfield, and more.
Family owned & operated
Richmond based
 
This listing is expired.
The listing logo for Truist Financial
Cybersecurity Senior Architect
Truist Financial
Richmond, VA
Full time
BankingFinanceCybersecurityIT
Posted 507 day(s) ago


Derive security specifications from business requirements, and design security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. Gain organizational commitment for security infrastructure systems and software plans, as well as assist to evaluate and select security technologies required to complete those plans. Provide integrated infrastructure-related technical expertise across the organization, from conceptualization and project planning to the post-implementation support level. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams. Security Solution Architects develop security specifications, requirements and architecture artifacts in compliance with corporate standards, laws and regulations for architecture adherence and performance guidelines.


Essential Duties and Responsibilities


Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Provide security infrastructure solution expertise, requirements, and assistance to Systems Analysts, Systems Engineers, other Solutions Architects, and application development teams.

  • Confer with end-users, clients, or senior management to define security infrastructure requirements for complex systems and infrastructure development.

  • Design and oversee development and implementation of end-to-end integrated security infrastructure solutions and communicate needs for investing in infrastructure evolution, including analysis of cost reduction opportunities.

  • Make recommendations for improvements and/or alternatives for the company’s existing solution architecture and technology portfolio.

  • Create and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.

  • Liaison with Enterprise Architects to conduct research on emerging technologies, and recommend technologies that will provide right-sized security posture, operational efficiency, infrastructure flexibility and operational stability.

  • Mentors less experienced teammates to build their own technical expertise.

  • Demonstrate deep specialization or comprehensive knowledge in Information Security (InfoSec) technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation.

  • Perform security reviews, identify gaps in security architecture and develop security risk management plans.

Qualifications


Required Qualifications:


The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor's degree in a technical or business field, or equivalent education and related training

  • Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation

  • Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives

  • Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines

  • Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding

Deep knowledge of:
  • Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization;

  • Authentication and authorization technologies including remote access;

  • Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments;

  • Enterprise databases and database security, including database activity monitoring and database access control technologies;

  • Encryption methods and technologies for data-in-transit and data-at-rest scenarios;

  • Incident response processes;

  • Denial of Service prevention mechanisms;

  • Firewall technologies and intrusion prevention methods;

  • Cloud technologies and hosting;

  • Operating system hardening;

  • Virtualization technologies;

  • Mobile technologies;

  • Encryption and key management technologies;

  • Endpoint Protection (includes malware);

  • Data Loss Protection technologies

Preferred Qualifications:

  • Degree in a related field from an accredited program or equivalent experience

  • Industry certifications in cyber security and forensics, such as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred

  • Industry certifications in general technology (MCP, MCSE, Network+, etc.)

  • Industry certifications in networking, such as CCNA, CWNA, and/or Net+ preferred

  • Cloud Experience (i.e. AWS, Azure, etc.)


How to Apply